An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
C’mon remember the Watergate break-in? Former CIA operatives were part of that. But wait, Nixon himself was being surveilled by the FBI. Anna Chennault, a GOP operative had interesting connections all throughout Asia. Those relationships were of big concern to the FBI and the Bureau was tracking those connections. That was all related to the Paris Peace talks on North and South Vietnam. Due to FBI eavesdropping and collections of diplomatic cables, Lyndon Johnson knew all about Nixon’s subterfuge. Have we forgotten the secret Nixon tapes? Too bad we can’t ask Mark Felt questions, dead men tell no tales.
Using intelligence agencies is an old habit yet Obama appears to have made an art of that exploitation. Obama spied on journalists including James Rosen of Fox News. Obama likely approved of John Brennan’s operation to spy on the senate staffers working on the enhanced interrogation techniques report headed by Senator Dianne Feinstein. Heck, Obama spied on Angela Merkel of Germany. Enter the NSA, they have everything. Edward Snowden proved that right? Not too sure FISA warrants were ever really needed in the first place, think about that.
Spies, informants and operatives come in many forms. They can be staffers, hired ladies, lawyers, lobbyists, policy wonks, people having cocktails at conventions, summits or conferences where business cards are exchanged for later email/phone call follow-up.
It is all old news. Old news and old tactics that get refined to due electronic communications, apps and encryption.
So, how do we know about these activities? Follow the money for starters. Remember the DNC and Hillary law firm, Perkins Coie.
The Obama for America committee paid Perkins Coie around $3 million during the 2012 election cycle, according to filings with the Federal Election Commission, A vast majority of the payments were earmarked for “Legal Services.”
Was Fusion GPS hired by Obama to surveil on Romney for opposition research? Was the media involved? Oh yeah, remember that debate and the advanced questions? Then of course we have Fusion GPS and Trump.
Okay, this brings us to the current #Spygate and the names bubbling to the surface.
One such name is Stefan Halper. During the presidential transition, Donald Trump’s top trade advisor Peter Navarro, recommended Halper for an ambassadorship. Heck Halper was in the White House Executive Office wing last summer to discuss Asia with particular emphasis on China.
Stefan Halper goes all the way back to the Reagan/Carter days. Oh, wait, even Gerald Ford and George HW Bush were included in Halper’s political history. Is there a difference between spying, intelligence collection and being a political operative? You decide.
There is more, How about Paul Corbin? He was a communist. And yes, he was an campaign operative too. He worked on the John F. Kennedy campaign. There was also ‘Debategate‘.
Moving on and do NOT hang your hat on Carter Page. Remember the Washington Post editorial board doing an early interview with Trump and a question arose about his foreign policy team? Well, Trump threw out 2 names from the hip, Carter Page and George Stephanopoulos. In fact neither had any quality role in the Trump operation. Another was Zalmay Khalilzad, former U.S. ambassador to Afghanistan, Iraq and the United Nations. Heck Trump never met Khalilzad. He remains a back channel fella with concerns still with Pakistan, Afghanistan and Iraq. Khalilzad was part of a money laundering investigation in 2014. Could he be an operative too?
Now take a moment and see the issue of Russian operatives and spies in the United States to understand how the FBI tails these people. In 2010, there was a spy swap (10 operatives) that included 2 key people. One such person was Anna Chapman who was assigned to get inside the Hillary State Department operation(s) and she did. The other is Sergei Skripal. He is the former Russian military officer and double agent that Russia just attempted to kill with Novichok, a nerve agent. Then there was this other double agent in New York that was captured in a counter-intelligence operation as a result of spy operations that work out of the Russian Mission to the United Nations.
Are you beginning to understand the other work of the FBI? President Bush expelled 50 Russians, Reagan expelled 55 Soviets and both Obama and Trump have expelled 35 and 60 respectively.
With those facts, does it stand to reason that the FBI rank and file agents are very concerned about foreign operatives in politics and campaigns? There is for sure an argument to be made that informants and plants are not only used by required.
Will we ever know all the puzzle parts to these cases? NO
Is #Spygate a one off with regard to President Trump? NO
Perhaps there is something yet to be discovered in Hillary’s missing emails or Peter and Lisa’s text messages. Hello IG report by Michael Horowitz.
The tactics are tried and true…however, when will the media much less the Republicans call out the abuse of power the Obama administration on all of this? In summary, the Trump administration should fight back and impeach those Obama operatives, what say you?
On March 21, 2018, the Senate Intelligence Committee held a hearing after much whining from Democrats on the topic of election security. It was quite the hearing where aggressive and snotty questions were put to current DHS Secretary Kirstjen Nielsen and former DHS Secretary Jeh Johnson.
Since that hearing, the Department of Homeland Security has reached out to almost every state and collaborated on issues of security of voter databases, ensuring security of voting machine software and held sessions of advise on what had transpired during the election year of 2016. Many states have taken substantial steps to ensure integrity of all systems.
The Senate Intelligence Committee members met in closed session to discuss their findings with former Director of National Intelligence James Clapper, former CIA director John Brennan, and former National Security Agency director Adm. Mike Rogers. None has wavered from the conclusions about Russian interference in the election, according to senators who were in the room.
Former FBI director James Comey had also been invited to testify about the findings to the panel, but did not attend.
So, in a classified setting both the House Committee on Homeland Security and the Department of Homeland Security hosted a briefing on the facts of Russian intrusion into the U.S. election infrastructure where all 435 members of Congress were invited. Those that were whining back in March were on the invitation list. How many did finally show up to assuage their concerns? Less than 50 and by most estimates, it was 30.
The Department of Homeland Security — which found evidence of Russian hackers targeting systems in 21 states ahead of the 2016 vote — is taking the lead on helping states secure their digital election assets. Meanwhile, the FBI is working to counter foreign influence operations. Coats was present to provide lawmakers with an overall threat picture.
“Americans’ votes must count, and they must be counted correctly,” Nielsen said.
Officials provided lawmakers with an unclassified resource guide of the services Homeland Security is offering to state and local officials who request aid, which range from simple cyber “hygiene” scans that can be done remotely to more rigorous risk and vulnerability assessments that require federal officials to be on the ground in states to test their systems.
Lawmakers from both parties have expressed concerns that Russia or other foreign adversaries would look to sow discord in future elections — fears that were echoed on Tuesday.
***
DHS is offering states voluntary cyber services, including remote checks of their election systems and on-site vulnerability assessments. It’s also granting security clearances to election officials, though they haven’t all been finalized.
States are now deciding how to use their share of $380 million in federal election security grants that came with the omnibus spending package earlier this year. But it’s hardly enough to update aging voting equipment in most states ahead of the November polls, and many state officials are hoping Congress will approve more dollars. More here.
Congress knows it needs to amend the CFIUS law, yet no one has proposed any legislation. Complying with CFIUS is optional. All this while China is the largest applicant in the United States for patents and is buying up land in Washington State with nefarious intentions under the guise of farm land operations.
Meawhile –>
Politico: The U.S. government was well aware of China’s aggressive strategy of leveraging private investors to buy up the latest American technology when, early last year, a company called Avatar Integrated Systems showed up at a bankruptcy court in Delaware hoping to buy the California chip-designer ATop Tech.
ATop’s product was potentially groundbreaking — an automated designer capable of making microchips that could power anything from smartphones to high-tech weapons systems. It’s the type of product that a U.S. government report had recently cited as “critical to defense systems and U.S. military strength.” And the source of the money behind the buyer, Avatar, was an eye-opener: Its board chairman and sole officer was a Chinese steel magnate whose Hong Kong-based company was a major shareholder.
Despite those factors, the transaction went through without an assessment by the U.S. government committee that is charged with reviewing acquisitions of sensitive technology by foreign interests.
In fact, a six-month POLITICO investigation found that the Committee on Foreign Investment in the United States, the main vehicle for protecting American technology from foreign governments, rarely polices the various new avenues Chinese nationals use to secure access to American technology, such as bankruptcy courts or the foreign venture capital firms that bankroll U.S. tech startups.
The committee, known by its acronym CFIUS, isn’t required to review any deals, relying instead on outsiders or other government agencies to raise questions about the appropriateness of a proposed merger, acquisition or investment. And even if it had a more formal mandate, the committee lacks the resources to deal with increasingly complex cases, which revolve around lines of code and reams of personal data more than physical infrastructure.
“I knew what was critical in 1958 — tanks, airplanes, avionics. Now, truthfully, everything is information. The world is about information, not about things,” said Paul Rosenzweig, who worked with CFIUS while at the Department of Homeland Security during President George W. Bush’s second term. “And that means everything is critical infrastructure. That, in some sense, means CFIUS really should be managing all global trade.”
As a senior official at the Treasury Department, which oversees CFIUS, put it: “Any time we see a company that has lots of data on Americans — health care, personal financial data — that’s a vulnerability.”
When CFIUS was formed, in the 1970s, the companies safeguarding important technology were so large that any takeover attempt by foreigners would be certain to attract attention. Now, much of the cutting-edge technology in the United States is in the hands of much smaller firms, including Silicon Valley startups that are hungry for cash from investors.
The gap in oversight became a more urgent problem in 2015, when China unveiled its “Made in China 2025” strategy of working with private investors to buy overseas tech firms. A year earlier, Chinese investments in U.S. tech startups had totaled $2.3 billion, according to the economic research firm CB Insights. Such investments immediately skyrocketed to $9.9 billion in 2015. These amounts dipped the following year, as the Obama administration voided a high-profile deal, but analysts say China’s appetite to buy U.S. firms and technology is still strong. In 2017, there were 165 Chinese-backed deals closed with American startups, only 12 percent less than the 2015 peak.
Yet the failure to investigate some forms of Chinese investments in American technology has flown under the radar as President Donald Trump goes tit for tat with Beijing, imposing tariffs meant to punish China for unfair trade practices. Critics noted on Monday that Trump’s tentative agreement to drop his tariff threat in exchange for Chinese pledges to purchase billions of dollars more in American goods avoided any mention of the outdated foreign-investment policies that have alarmed lawmakers across the political spectrum.
On the Senate floor Monday, Minority Leader Chuck Schumer (D-N.Y.) lashed out at Trump’s approach.
“China’s trade negotiators must be laughing themselves all the way back to Beijing,” he said. “They’re playing us for fools — temporary purchase of some goods, while China continues to steal our family jewels, the things that have made America great: the intellectual property, the know-how in the highest end industries. It makes no sense.”
National security specialists insist that such a stealth transfer of technology through China’s investment practices in the United States is a far more serious problem than the tariff dispute — and a problem hiding in plain sight. A recent Pentagon report bluntly declared: “The U.S. does not have a comprehensive policy or the tools to address this massive technology transfer to China.” It went on to warn that Beijing’s acquisition of top-notch American technology is enabling a “strategic competitor to access the crown jewels of U.S. innovation.”
Some congressional leaders concur. Senate Majority Whip John Cornyn (R-Texas) regularly warns his colleagues that China is using private-sector investments to pilfer American technology. China has “weaponized” its investments in America “in order to vacuum up U.S. industrial capabilities from American companies,” Cornyn said at a January hearing. The goal, he added, is “to turn our own technology and know-how against us in an effort to erase our national security advantage.”
Legislation to expand the CFIUS budget and staff has been moving slowly through the halls of Congress amid pushback from Silicon Valley entrepreneurs and business groups. The legislation would give CFIUS new resources to scrutinize bankruptcy purchases and establish stricter scrutiny of start-up investments.
As months passed without any action, and the issue of Chinese investments got overshadowed by tariff fights and feuds between Beijing and the Trump administration, national security experts grew more concerned, fearing that Congress lacked a sense of urgency to police transfers of sensitive technology.
The White House began exploring what more it could do on its own, asking the Treasury Department in late March to offer a list of potential Chinese investment restrictions within 60 days.
Finally, earlier this month, Senate and House leaders announced plans to mark up the bill, starting a process that could lead to passage later this year.
Still, the failure to act more quickly may itself be jeopardizing national security. At a hearing in January, Heath Tarbert, the Treasury Department assistant secretary overseeing CFIUS, testified that allowing foreign countries to invest in U.S. technology without making sufficient background checks “will have a real cost in American lives in any conflict.”
“That is simply unacceptable,” he said.
‘Made in China 2025’
Last October, Chinese President Xi Jinping took the podium before 2,300 Communist Party delegates to deliver his expansive vision for China’s future.
Xi was speaking at the party’s 19th Congress, a summit held every five years to choose the nation’s leaders in the Great Hall of the People in Beijing, the expansive theater right off Tiananmen Square. Speaking in front of a giant gold hammer and sickle framed by bright red drapes, Xi held forth for 3½ hours, declaring that China would look outward to solve its problems.
“China will not close its door to the world — we will only become more and more open,” Xi declared to his rapt audience of party leaders, many of them having close ties to the billionaire investors who represent China in the global market. “We will deepen reform of the investment and financing systems, and enable investment to play a crucial role in improving the supply structure.”
China watchers said Xi was alluding to the government’s relatively new economic plan, dubbed “Made in China 2025,” which leaders had unveiled in 2015. The detailed vision shifted the focus on domestic research investments to the need to pump money into — and better understand — foreign markets.
“We will,” the document proclaimed, “guide enterprises to integrate into local culture.”
“We will,” the document continued, “support enterprises to perform mergers, equity investment and venture capital investment overseas.”
At the top of the investment wish list were high-tech industries like artificial intelligence, robotics and space travel.
For the increasingly powerful Chinese leader, it was the culmination of years of efforts to guide how China spends its blossoming wealth. In addition to luring foreign companies to China, Xi wanted the country — which is sitting on several trillion dollars in foreign exchange reserves — to start investing abroad.
The plan had “much more money behind it” and “much more coordination” between Beijing and Chinese industrialists than previous economic strategies, according to Scott Kennedy, an expert on Chinese economic policy at the Center for Strategic and International Studies, a Washington think tank that specializes in defense matters.
“And a big component of that is acquiring technology abroad,” he said.
From 2015 to 2017, Chinese venture capitalists pumped money into hot companies like Uber and Airbnb, but also dozens of burgeoning firms with little or no name recognition. The country didn’t just want “trophy assets,” Kennedy explained. China’s leaders wanted to “fill in some of the gaps they have” in China’s tech economy.
While the Asian power has piled up profits from its large manufacturing plants that churn out low-cost products, the Beijing government realized it would face declining productivity unless its economy, from agriculture to manufacturing, adopted high-tech methods. Essentially, China wanted to automate entire industries — including car manufacturing, food production and electronics — and bring the whole process in-house.
So Beijing’s leaders encouraged the country’s cash-rich investors to search for “emerging companies that have technologies that may be extremely important … but aren’t proven,” Kennedy said. The initiative has spawned investments in American startups that work on robotics, energy equipment and next-generation IT. Of particular concern to U.S. national security officials is the semiconductor industry, which makes the microchips that provide the “guts” of many advance technologies that China is seeking to leverage.
“A concerted push by China to reshape the market in its favor, using industrial policies backed by over one hundred billion dollars in government-directed funds, threatens the competitiveness of U.S. industry and the national and global benefits it brings,” declared a January 2017 report from the President’s Council of Advisors on Science and Technology, warning of the urgent threat to U.S. superiority in semiconductor technology.
Notably, many of China’s investments didn’t register on the CFIUS radar. They involved the early-seed funding of tech firms in Silicon Valley and low-profile purchases such as the one in Delaware bankruptcy court. They included joint ventures with microchip manufacturers, and the research and development centers created with international partners.
“They have diversified to look for smaller targets,” Kennedy said. “Those things typically do not generate a CFIUS reaction. That is part of it.”
An obscure research body
CFIUS was set up by Congress in 1975 amid growing concerns about oil-rich countries in the Middle East buying up American companies, from energy firms to armsmakers. Chaired by the Treasury Department, the committee brought together representatives from all the major Cabinet agencies to assess the financial, technological and national security threats posed by such investments. For its first decade, however, CFIUS existed mostly as an obscure research body. From 1975 to 1980, the committee met only 10 times, according to congressional reports.
Japan’s economic ascendance in the 1980s changed that. The Defense Department asked CFIUS to step in and investigate potential Japanese purchases of a U.S. steel producer and a company that made ball bearings for the military. In 1988, Congress gave the committee the authority to recommend that the president nix a deal altogether. Still, the committee remained mostly an ad hoc operation into the 1990s.
“Bureaucratically it was not a very smooth, functioning operation,” recalled Steve Grundman, who worked as part of the committee during the Clinton administration. “We had to pick up some intelligence here, some technology assessment there, some industrial analysis hither.”
After the Sept. 11, 2001, terrorist attacks, Congress renewed its interest in CFIUS, passing legislation that instructed the committee to consider a deal’s effect on “homeland security” and “critical industries,” a notable change, according to Rosenzweig, the DHS official who worked with CFIUS during the George W. Bush administration. The directive gave the committee a mandate to keep an eye on a wider array of industries, such as hospitals and banks, that DHS considered “critical” to keeping American society operating.
Rosenzweig called it a “singular shift.” Over time, he said, the committee went from reviewing acquisitions of steel companies — involving just two parties and a tangible product — to investigating technically complex purchases of microchip companies and other software or data-rich firms.
“When I first came to CFIUS, the filings from the other side would be a few-page letter about why this was a good deal,” Rosenzweig said. “Now it’s a stack of books that’s up to my knee.”
The committee’s staffing and resources have not kept pace with the growing workload, multiple people who work with CFIUS told POLITICO. While the Treasury Department has been hiring staffers and contractors to help handle the record workload, the committee’s overall resources are subject to the whims of the individual agencies involved in the process, said Stephen Heifetz, who oversaw the CFIUS work at DHS during the second Bush administration.
There is no single budget or staffing figure for CFIUS. Instead, each agency decides the level of personnel and funding it’s willing to commit to the committee. The Treasury Department and DHS have two of the larger CFIUS teams, Heifetz said. During his tenure, Heifetz’s DHS squad included roughly 10 people, split equally between government workers and outside contractors.
“Each agency decides more or less on their own how they’re going to staff it,” Heifetz said.
At Treasury, there are now between 20 and 30 people working for CFIUS, according to a senior department official. But even with the expanded team, the committee is stretched precariously thin. The official described 80-hour workweeks, regular weekend work and no ability to take time off.
“It’s enough to handle the current mandate, but not comfortably,” the official said.
Amid this uncertainty over resources, CFIUS investigations into foreign acquisitions nearly tripled from 2009 to 2015. The most common foreign investor that hits the CFIUS radar is now China. Nearly 20 percent of the committee’s reviews from 2013 to 2015, the most recent data available, involved the Asian power, easily ahead of second-place Canada at just under 13 percent.
Since 2015, the Treasury official said, those trends have only continued: Chinese deals now represent a large plurality of the committee’s work.
The attention appears to be well-founded. In recent years, China has been repeatedly accused of industrial espionage — using indirect means to obtain American software and military secrets, everything from the code that powers wind turbines to the designs that produce the Pentagon’s modern F-35 fighter jets. And several Chinese businessmen have pleaded guilty to participating in complex conspiracies to get their hands on sensitive technical data from U.S. firms and shuttle it back to Beijing. Again and again, high-tech products and military equipment have popped up in China that bear a too-striking resemblance to their American counterparts.
Spurred by these incidents, CFIUS has successfully advised the president to nix Chinese deals at a record clip. In December 2016, President Barack Obama stopped a Chinese investment fund from acquiring the U.S. subsidiary of a German semiconductor manufacturer — only the third time a president had taken such a step at that point. In September 2017, Trump halted a China-backed investor from buying the American semiconductor maker Lattice, citing national security concerns.
Three months later, a Chinese company’s plan to acquire the American money transfer company MoneyGram fell apart when the two sides realized they would likely not get CFIUS approval because of concerns that the personal data of millions of Americans — including military personnel — could fall into the hands of the Chinese military.
Weeks after that, the committee essentially jettisoned a Chinese state-backed group’s attempt to buy Xcerra, a Massachusetts-based tech company that makes equipment to test computer chips and circuit boards. Then, in March, Trump blocked the purchase of the chipmaker Qualcomm by Singapore-based Broadcom Ltd. CFIUS said such a move could weaken Qualcomm, and thereby the United States, as it vies with foreign rivals such as China’s Huawei Technologies to develop the next generation of wireless technology known as 5G.
To national security leaders, though, CFIUS is still only scratching the surface of China’s ambitions to acquire U.S. technology, noting that traditional sale-and-purchase agreements to obtain a U.S. company aren’t the only ways to gain access to cutting-edge technology.
“You can buy a [partial] interest in a company and gain access to the same type of technology,” Attorney General Jeff Sessions told Congress in October, adding that Justice Department investigators “are really worried about our loss of technology” in instances where Chinese investors buy small stakes in American tech companies.
The U.S. military has raised similar concerns. Defense Secretary Jim Mattis warned last summer that America is failing to restrict foreign investments in certain types of critical industries, testifying during another hearing that CFIUS is “outdated” and “needs to be updated to deal with today’s situation.”
A mysterious takeover
The case that occurred last summer in an obscure courtroom in Delaware seemed innocuous enough: one relatively small tech firm buying out a bankrupt competitor, a transaction that elicited about as much drama as mailing a letter.
The bankrupt semiconductor maker ATop Tech had only 86 employees when it was declared insolvent. But it had a more than a $1 billion market share of the electronic-design automation and integrated circuits markets, the company told the bankruptcy court, giving it potential value to any player seeking to enter the highly specialized semiconductor industry.
Avatar Integrated Systems, the company seeking to purchase ATop, was apparently such a player. But it was not well known to others in the semiconductor industry, and its precise ownership was a bit of a mystery. The sole director listed on its incorporation papers was a Hong Kong-based businessman named Jingyuan Han, and it issued shares to King Mark International Limited, a Hong Kong company in which Han was an investor. Avatar was set up in March 2017, according to the company.
The transaction went ahead despite concerns raised to the court by other players in the semiconductor industry, as well as those of a former senior Pentagon official who specifically suggested the Chinese government may be backing Avatar.
The former Pentagon official, Joseph Benkert, was enlisted by another American semiconductor company, Synopsys, to help recoup money it was owed by ATop. He warned the court that the deal might have national security risks.
“CFIUS has identified businesses engaged in design and production of semiconductors as presenting possible national security vulnerabilities because they may be useful in defending, or seeking to impair, U.S. national security, as semiconductor design or production may have both commercial or military applications,” Benkert, the former assistant secretary of defense for global affairs under the second Bush administration, wrote to the court.
Benkert argued that the question of Avatar’s ownership needed more review given that the company appeared to be “under the control of Han, a Chinese national.”
“In my opinion,” Benkert wrote, “the proposed transaction is likely to receive thorough CFIUS scrutiny and there is a material risk that it will not receive CFIUS approval.”
But despite those concerns, the deal to buy ATop Tech was not given a formal review by CFIUS, according to a senior administration official with direct knowledge of the process. A Treasury Department official, speaking on behalf of CFIUS, declined to comment on the merger.
An Avatar official, reached at the company office in Santa Clara, California, did not respond to questions or a request for an interview with Han. The company did not respond to multiple requests to discuss its relationship — if any — with the Chinese government or the details of its business.
Han, who has been described in media reports as one of China’s wealthiest men, has spent his career almost entirely in the iron and steel industries. Avatar’s scant history seemed to suggest that it was created for the sole purpose of acquiring an established American semiconductor firm like ATop Tech, according to several former national security officials who still work on CFIUS cases.
Attempts to reach Han through China Oriental Group, the iron and steel company that he runs, were also unsuccessful.
Officials familiar with the CFIUS process say that bankruptcy deals such as the Atop-Avatar case sometimes fall off their radar because of difficulty in discerning whether Chinese investors are working with the government. In other bankruptcy cases, Chinese investment in a potential buyer may not be visible in official filings, especially when a web of holding companies is involved. Thus, say current and former officials working with CFIUS, a significant amount of detective work is necessary to discern both the identity and the intentions of the investors.
Traditionally, courts have defined control of a company as “the ability to direct management to make certain decisions.” But a former Treasury Department official said CFIUS needs to focus on “beneficial ownership,” defined as having the ability to obtain technology from the firm, rather than overall decision-making power.
“It is very hard to find beneficial ownership,” said the official. “Our concern is the capacity of the system to deal with these.”
The bills pending in Congress to strengthen the CFIUS review process include provisions designed to make scrutiny of bankruptcy cases easier. The bills would require CFIUS to “prescribe regulations to clarify that the term ‘covered transaction’ includes any transaction … that arises pursuant to a bankruptcy proceeding or other form of default on debt.”
A sharper focus on bankruptcy cases, particularly in making sure CFIUS scrutinizes investors to ties to foreign governments, is desperately needed, said a former Pentagon official who is still involved in CFIUS cases. “How do they find out about it now? They are reading The Wall Street Journal late at night,” the official said. “It is not a very systematic process.”
The former official also recalled that in the past, the Pentagon has hired an outside contractor to scour around for unreported transactions that might raise some national security flags, such as in the semiconductor or aerospace sectors. Such checks need to be performed in a more systematic way.
“There is no process for surfacing information out of the bankruptcy courts,” the official said.
China goes to Silicon Valley
In Silicon Valley, Chinese investment isn’t typically viewed as a threat, but rather more of a blessing.
Chris Nicholson, co-founder of Skymind, an artificial intelligence company that makes the type of cutting-edge software that both the United States and China covet, recalls the many long months he spent in 2014 trudging up and down Sand Hill Road, the heart of Silicon Valley’s leading venture capital firms, and all the doors that slammed shut.
“That was a long, dry year for us,” he told POLITICO.
Nicholson hadn’t sought Chinese money. But then Tencent, China’s internet and telecommunications giant and now one of the world’s largest companies, approached the firm, offering $200,000 in seed funding. The Chinese monetary infusion buoyed Skymind, which soon landed a coveted spot in Y Combinator, the powerful startup accelerator. American investors, who had only months earlier eschewed the firm’s overtures, quickly changed their tune. Chinese investment soon beget American investment.
“It was that crucial piece of Chinese capital that allowed us to survive,” Nicholson said. “That’s all it took. Now we’re a company with 35 employees.”
Reflecting a common feeling among his cohorts in Silicon Valley startups, Nicholson insisted that working with Chinese investors does not mean granting Beijing officials access to the coding process. “My American co-founder and I are in control,” Nicholson said, noting that Skymind has given up none of the rights to its intellectual property and has made its code “open sourced,” which means the code is freely available for cybersecurity experts to inspect, audit and offer suggestions.
But Bryan Ware, CEO of Haystax Technology, which works with law enforcement, defense and intelligence clients on securing their technologies, cast some doubt on the idea that the owners of tech startups would naturally refuse to share details of their technology with their investors: “If you’ve got a Chinese investor and that’s the lifeblood that’s going to allow you to get your product out the door, or allow you to hire your next developer, telling them, ‘No, you can’t do that,’ or, ‘No you shouldn’t do that,’ while you have no other alternatives for financing — that’s just the nature of the dilemma.”
“Every investment comes with a risk of some loss of intellectual property or foreign influence and control,” Ware said.
And too many Silicon Valley deals exist in a “netherworld” between passive investment and absolute takeover, “where there’s access to information, technical information, [and] there is the ability to influence and potentially coerce management,” according to the senior Treasury Department official.
One major concern among specialists like Ware is that Beijing officials could use early Chinese investments in next-generation technology to map the software the federal government and even the Defense Department may one day use — and perhaps even corrupt it in ways that would give China a window into sensitive U.S. information.
A POLITICO review of 185 tech startups with Chinese investors found just over 5 percent had received government contracts, loans or grants ranging from a few thousand dollars to several million dollars. Often, the contracts simply involved research — renewable energy for the Energy Department, electronics and communications equipment for the Pentagon, space technology for NASA. Others ordered lab equipment for the Commerce Department, or machine tools for the military.
“There’s a tremendous amount of intelligence value there,” Ware said. “All governments desire to know what other governments are doing. And knowing the technologies and how they work I think is a big part of that.”
While there’s no indication that the firms had U.S. government contracts at the time that Chinese investors became involved, that may be part of China’s strategy. Derek Scissors, who manages the American Enterprise Institute’s China Global Investment Tracker, an exhaustive database of China’s major global investments, said that as welcome as the surge of Chinese-funded deals may be in Silicon Valley, the engine behind them is the Chinese government. China’s Silicon Valley investment strategy “was shaped by the state and that shaping has gotten tighter,” he said.
Still, many Chinese investments in the United States are not directly backed by the Beijing government, but it can be hard to distinguish.
Some prominent Chinese VC firms in Silicon Valley have clear links to the government. Westlake Ventures, for example, received funding from the government in the coastal Chinese city of Hangzhou, according to media reports and a Pentagon research paper. And Westlake has put money into other VC funds, such as the WI Harper Group, which has a stake in a wide slate of American tech companies, from a dating app to a three-dimensional imaging company to a maker of robot cooks. Westlake did not respond to a request for comment.
But it’s not always easy to trace the money back to a single source, let alone determine what connection that source has to Beijing’s Communist leadership. Haiyin Capital, a Beijing-based VC firm, is partially backed by a state-run Chinese company, according to a company release. Also complex is ZGC Capital Corporation — located in Silicon Valley and focused on providing startups with basic business help — is a subsidiary of a state-owned enterprise funded by the Beijing government, according to the organizations’ websites. Attempts to reach each organization were unsuccessful.
Security and economics experts say they are unsure how much financial or national security harm these Chinese investments are actually causing the United States — if any — simply because it may not be clear for years exactly how important the technology may be.
In the meantime, entrepreneurs in Silicon Valley are blunt: America actually needs Chinese money to maintain its global tech advantage.
“Here’s my warning shot,” Nicholson said. “If we make it difficult for foreign talent and foreign capital to find each other by over-regulating early-stage startup investing … we will lose our supremacy as the top tech economy in the world.”
Enter Congress
In Washington, Silicon Valley’s warning has been heard loudly enough to delay the passage of a bill to strengthen the CFIUS process, despite the support of such bipartisan figures as Cornyn, the second-ranking Senate Republican, and California’s own Democratic Sen. Dianne Feinstein, the ranking member of the Senate Judiciary Committee.
Last year, after a cascade of warnings from the Defense Department, Justice Department and other powerful sources, both the House and Senate seemed ready to take action to strengthen oversight of foreign investment in technology companies.
The bipartisan proposal would direct CFIUS to consider whether pending investments would erode America’s technological edge, enable a foreign government to utilize digital spying powers that might be used against the United States, or give sensitive data — even indirectly — to a foreign government. Similarly, it would expand the definition of “critical industries” — a reference to sectors like banking, defense or energy — to include “critical technologies,” a significant expansion of the committee’s current mandate.
Under the bill, CFIUS would have to create a system to monitor transactions that aren’t voluntarily brought to the committee’s attention.
The measure would also centralize some of the committee’s functions and allow the committee to charge filing fees up to 1 percent of the total value of the transaction up to $300,000, and let Treasury offer a single CFIUS budget request rather than relying on contributions from other departments.
The Trump administration offered a full-throated endorsement of the bill in January, saying it “would strengthen our ability to protect national security and enhance confidence in our longstanding open investment policy.”
And while the bill doesn’t explicitly cite China, the provisions are clearly aimed at limiting its access to the most sensitive areas.
“Any Chinese-related company that is part of our supply chain is a concern to me,” Rep. Robert Pittenger (R-N.C.), a lead House sponsor of the bill, told POLITICO.
Pittenger insisted that Congress’ inaction is allowing China to brazenly pilfer the technology that drives America’s military might, and sell that technology to adversaries like Iran and North Korea. He noted that a Treasury official told him getting the bill signed is the department’s No. 1 legislative priority for 2018.
“We can’t turn a blind eye to this,” Pittenger said.
But many technology entrepreneurs believe the bill would simply drive cutting-edge research overseas. In 2016, foreign investors injected $373 billion into the United States, a figure that has been mostly increasing since the early 2000s, according to government data. Lengthening the CFIUS review time — currently 30 days, but set to extend to 45 days under the new bill — could damage the “brittle process” of early-stage fundraising, said Nicholson, who encouraged lawmakers to focus on expanding CFIUS powers in other areas, such as bankruptcy courts.
“I worry that they’re driving a bulldozer towards a rose garden,” said Nicholson, echoing his claim that training the CFIUS lens on Silicon Valley could scare off the very financing that keeps America growing.
IBM’s vice president for regulatory affairs, Christopher Padilla, agreed, warning at a January hearing that the bill “could constitute the most economically harmful imposition of unilateral trade restrictions by the United States in many decades.”
He raised particular concerns about expanding CFIUS authority to cover foreign investments in “critical technologies,” a phrase tech leaders say is worryingly opaque and that could force companies peddling sensitive technology to have every single sale reviewed.
Padilla called it a “we’ll know it when we see it” approach to regulating that “would be deeply damaging to U.S. competitiveness, and, more important, could lead to a false sense of security.”
Some industry groups have suggested that the bill should delineate these technologies — robotics or artificial intelligence, for instance — to avoid having every deal scrutinized from top to bottom.
“We would be well served to define those issues from the outset,” said Dean Garfield, CEO of the Information Technology Industry Council, a trade group representing industry heavyweights such as Amazon, Apple, Facebook, Google, Microsoft and Twitter. Garfield said getting the bill revised is a top-five issue for ITI in 2018.
He cautioned that the bill, as written, could spike the number of annual CFIUS reviews from “a few hundred deals” to “a few thousand.”
Proponents, however, feel that specifying specific technologies might be impossible. The software powering the country — from waterways to missile systems — is constantly changing and evolving, they say. Instead, they suggest, new CFIUS funds and a streamlined reporting process would help keep the growing stream of deal reviews moving.
“For the price of a single B-21 bomber, we can fund an updated CFIUS process and protect our key capabilities for several years,” Cornyn said at a hearing. “That is a down payment on long-term national security.”
Nonetheless, lawmakers have been working to address industry complaints, making tweaks to the legislation. And just last week, lawmakers made a breakthrough, agreeing to slightly narrow the bill’s scope, raising the chances the measure will make it to the president’s desk.
The House and Senate are scheduled to mark up their respective CFIUS bills on Tuesday, and lawmakers now are angling to attach the legislation to the annual, must-pass defense authorization bill as a way to guarantee it gets through. But lingering disputes could still derail the process.
National security leaders and lawmakers warn that these squabbles, while reflecting sincerely held positions, are simply delaying necessary action. At that January hearing, Cornyn described a changing reality if CFIUS is left in its current iteration.
“Just imagine if China’s military was stronger, faster and more lethal,” Cornyn said.
“That is what the future likely holds,” he added, “unless we act.”
Today, May 20, Steve Mnuchin, Treasury Secretary announced the tariffs are on hold, pending some kind of a tentative agreement. Really Steve? This as the North Korea Kim/Trump talks are on shaky ground. China wants North Korea to have nuclear weapons, period.
A threat to the United States? Yes. To allies? Yes
China has overtly weaponized those pesky island with a H-6 bomber aircraft landing on Woody Island. Did President Xi share any of this with President Trump at that confab at Mar A Lago? The matter of the South China Sea and those disputed waters and island is hardly any new threat. It goes back to at least 2014 and President Obama was briefed often on the building Chinese aggression. There was a temporary Asia Pivot by Obama but it was merely a gesture in retrospect. That Asia Pivot hardly raised any eyebrows in Beijing.
The reason to recall diplomats and expel others from the United States? At least the first one, laser attack on our U.S. airmen.
8 May 2018 — The two airmen reported symptoms of dizziness and seeing rings. Pointing lasers at aircraft is extremely dangerous. It can temporarily blind pilots, and in the United States it’s a federal offense. While the pilots are expected to make a full recovery, the incident raises questions about how far the United States will allow China to push it without pushing back.
But first let’s back up. What’s everyone doing in Djibouti, a tiny country in eastern Africa? America has a base in Djibouti because of its proximity to Yemen, a terrorist incubator. The 4,000 U.S. troops stationed there are tasked with conducting counter-terrorism operations in the region.
What about China? Well, that’s a little more opaque. China opened its Djibouti base last August, claiming that its purpose is to help with anti-piracy patrols and other peacekeeping missions. It’s supposedly a logistics base, but here’s the thing: China doesn’t have foreign military bases anywhere in the world — except in Djibouti, eight miles from the U.S. base.
But is worse…anyone paying attention outside of Gordon Chang and Steven Mosher? Yes thankfully, Congress is. FINALLY
Suggest you watch this video, consider how much of it, if not all of it was stolen from the United States.
China and Russia have an alliance on military, missile and hybrid tactics to alter the balance of global power.
Then there was the China Argentina issue with the Falklands, again.
China has instituted national re-education program. The program is a hallmark of China’s emboldened state security apparatus under the deeply nationalistic, hard-line rule of President Xi Jinping. It is partly rooted in the ancient Chinese belief in transformation through education – taken once before to terrifying extremes during the mass thought reform campaigns of Mao Zedong, the Chinese leader sometimes channeled by Xi.
A significant Chinese operation is debt-trapping. Sri Lanka and the Philippines are already falling due to this.
If you look at the Qing Dynasty, that is President Xi’s vision and Taiwan is an important key to that achievement. China Wants to Build a Massive Underwater Tunnel to Taiwan and to own/control Taiwan by 2020.
OBOR, One Belt, One Road is a sophisticated trade strategy on a global scale and it threatens currency stability, port security, transportation channels and debt.
He knew what was coming and attempted to hide and store his electronic devices at Granite Intelligence. Lots of interesting stuff on those devices. There is always more to the story, right?
The serial sexter — whose online aliases included “Carlos Danger” — wanted to rid himself of the incriminating evidence and “facilitate transfer to the government” so he could avoid an FBI raid on the Union Square apartment he shared with his wife and young son, a source familiar with the matter said.
Granite Intelligence, which is based in Midtown Manhattan and was co-founded by a former New York City prosecutor, is “committed to resolving our clients’ problems with intelligence, integrity and discretion,” according to its Web site.
Federal agents got permission to seize the electronics on Sept. 26, 2016, and a search of the laptop turned up e-mails between Weiner’s wife, Huma Abedin, and her boss, then-Democratic presidential candidate Hillary Clinton.
The discovery led the FBI to re-open its investigation into Clinton’s use of a private e-mail server while she served as secretary of state under former President Barack Obama.
Clinton has blamed the reopening of the probe, which then-FBI Director James Comey revealed to Congress 11 days before the 2016 election, for her loss to President Trump.
Last year, Weiner tearfully pleaded guilty to transferring obscene material to a minor, breaking down as he told the judge: “I knew that was morally wrong.”
Hat tip: District Judge Denise Cote unsealed the search warrant for the laptop and other devices of former Congressman Anthony Weiner on Wednesday, May 16.
Weiner was sentenced by Cote in September to 21 months in prison for sending obscene material—including sexually explicit images and directions to engage in sexual conduct—to a 15-year-old girl through messaging and video chat apps.
New York City Police obtained a search warrant on his laptop, iPad, and iPhone on Sept. 26, 2016, approved by Magistrate Judge Ronald Ellis.
The laptop soon became the center of a major controversy. However, the search warrant suggests the controversy may run deeper still.
On Nov. 4, 2016, former Navy SEAL and CIA contractor Erik Prince said “a very well-placed source” at the NYPD told him the NYPD found “damning criminal information” about then-presidential candidate Hillary Clinton on Weiner’s laptop and threatened to release it if the FBI tried to sweep it under the rug.
The FBI later obtained its own search warrant and looked at the laptop in connection with its investigation into Clinton’s mishandling of classified information as State Secretary.
But there was a notable difference between the FBI warrant and the NYPD one.
The one obtained by NYPD read, in part: “Depending on circumstances, a complete review of the seized [electronically stored information] may require examination of all of the seized data to evaluate its contents and determine whether the data is responsive to the warrant.”
The FBI one read, in part: “Law enforcement personnel will make reasonable efforts to restrict their search to data falling within the categories of evidence specified in the warrant.”
That would suggest the NYPD could look at everything, while the FBI investigators worded its warrant in a way that restricted them to look only at data regarding the mishandling of classified information.
Here’s what we know about how Clinton’s emails ended up on Weiner’s laptop and what repercussions their discovery meant:
Weiner shared the laptop with his estranged wife, Huma Abedin, a close aide to Hillary Clinton since 2000.
Hundreds of thousands of emails were stored on the laptop, including thousands from Clinton.
“Huma Abedin appears to have had a regular practice of forwarding emails to [Weiner] for him,” then-FBI Director James Comey testified at a Senate Judiciary Committee hearing on May 3, 2017. “I think, to print out for her, so she could then deliver them to [Clinton].”
The existence of the emails was also confirmed in texts between senior FBI attorney Lisa Page and former head of counterintelligence at the FBI, Peter Strzok.
“Got called up to Andy’s earlier … hundreds of thousands of emails turned over by Weiner’s atty to sdny, indudes a ton of material from spouse,” Strzok texted (pdf) Page on Sept. 28, 2016, only two days after the search warrant: “Sending team up tomorrow to review … this will never end ….”
The text suggests that then-FBI Deputy Director Andrew McCabe, referred to as Andy, knew of the emails. Strzok noted that a team would go to “review” the next day, Sept. 29, 2016.
But this timeline seems to conflict with a Chicago Tribune story, which said that law enforcement officers first seized the laptop on Oct. 3, according to “federal officials familiar with the investigation.”
The text suggests McCabe knew about the emails on Sept. 28 because Weiner’s attorney himself delivered the emails to the U.S. Attorney’s Office for the Southern District of New York. It is not clear why.
It was McCabe who led a small group at FBI headquarters on the Clinton investigation. Both Strzok and Page were in that group. Comey announced the conclusion of the investigation on July 5, 2016.
The Hill reported on Nov. 6 that Strzok changed key language in that conclusion from “grossly negligent,” which would have been a crime, to “extremely careless.” Changing the phrase may have exonerated Clinton.
The Weiner laptop turned out to have a trove of Clinton’s emails containing classified information and emails from the first three months of her term as State Secretary—emails that the FBI had not obtained before, Comey said.
But, Comey said it took until Oct. 27, 2016, for their small team to come to him and tell him about the significance of the emails. The group was only looking at the emails’ metadata—such as subject, sent date, and addressee—according to Comey, and asked him whether they should get a search warrant to look at the emails themselves, which Comey approved.
Comey told Fox News’ Bret Baier he didn’t know why it took a month for McCabe to come to him, especially given the significance of the discovery only a few weeks before the presidential election.
“I think what actually drove it was the prosecutors in New York who were working the criminal case against Weiner called down to headquarters and said, ‘Are we getting a search warrant or not for this?’ That caused, I’m sorry, Justice Department Headquarters, to then call across the street to the FBI and poke the organization; and they start to move much more quickly. I don’t know why there was, if there was slow activity, why it was slow for those first couple of weeks,” Comey said on April 26.
Indeed, at least one high-ranking Justice Department official prodded the team about the Weiner trove.
On Oct. 21, 2016, Strzok texted, “[redacted] called [because] Toscas [is] now aware NY has [Clinton-Abedin] emails via [W]einer invest[igation]. Told him we knew. Wanted to know our thoughts on getting it.”
Strzok was referring to George Toscas, deputy assistant attorney general at the Justice Department’s National Security Division.
“George wanted to ensure info got to Andy,” Strzok wrote.
It was also Toscas, who, according to The New York Times, criticised Comey for caving to Attorney General Loretta Lynch in calling the Clinton probe a “matter” instead of an investigation back in 2015.
“I guess you’re the Federal Bureau of Matters now,” Toscas said.
But it’s not clear why the New York prosecutors would call Justice Headquarters about a search warrant. They’d had a search warrant for their investigation since Sept. 26. There’s no sign they had anything to do with the Clinton investigation because that was run by the team at the FBI headquarters.
It is also not clear whether Toscas’ call was motivated by the NYPD threat of disclosure Prince talked about. Prince said the NYPD received strong pushback from Obama’s Justice Department—a threat to push charges against the NYPD in an unrelated civil rights case.
Meanwhile, the Strzok texts reveal the team had another contingency on its hands. On Oct. 24, 2016, The Wall Street Journal reported that after the Clinton probe started in July 2015, McCabe’s wife, Jill, received some $675,000 for her Virginia State Senate campaign from Clinton associate Gov. Terry McCauliffe’s political entities.
On Jan. 29, 2016, Comey appointed McCabe deputy director, putting him in charge of the Clinton investigation.
On the day Comey was briefed by the team on Oct. 27, 2016, his chief of staff, Jim Rybicki, wanted McCabe to recuse himself, the Strzok texts suggest, apparently because the public learned McCabe’s wife was getting money from the Clinton camp.
The texts also suggest Page, who was McCabe’s legal counsel, was to recuse herself too, which she apparently wasn’t thrilled about.
“I obviously don’t have to tell you how completely INFURIATED I am with Jim [Rybicki] right now,” she texted.
Later that day she added, “I Just walked in on Jim to force the issue. Me: ‘I’m not recused, but I’m not sitting in on this meeting.’” It’s not clear which meeting she was referring to.
On Oct. 28, 2016, Comey sent a letter to Congress members sitting on oversight committees informing them the Clinton investigation had resumed. The information quickly reached the media, infuriating Democrats.
The team obtained a search warrant for the laptop on Oct. 30, 2016, allowing them to retrieve it from the FBI New York Field Office.
A day later, McCabe recused himself from the investigation, codenamed “Mid Year.”
“Thanks to the wizardry of our technology, we’ve only had to personally read 6,000 [of the emails],” the team told Comey on the night of Nov. 4, he later testified before Congress. “They said, ‘we found a lot on new stuff. We did not find anything that changes our view of [Clinton’s] intent.’”
The lack of intent in being “extremely careless” with classified information was Comey’s justification for not charging Clinton back in July, 2016.
On Nov. 5, 2016, Comey sent another letter to Congress saying all the newly discovered Clinton emails had been reviewed and the previous decision stood—no charges.