Pritzker, Boxer, Sherman and MoveOn.org, the Strike Force

The top person on John Kerry’s Iran JPOA team was Wendy Sherman. But then we have Obama’s dear friend Penny Pritzker in the mix too, along with Barbara Boxer and Hillary’s Jake Sherman all part of this National Security Action team, which is all things against Trump. So, while we do have the Director of MoveOn in the mix…this group likely has some robust funding from Soros.

This is a strike force that even includes Jeremy Bash.

He served as Chief of Staff of the CIA (2009-2011) and Defense Department (2011-2013), was Panetta’s right hand person and perhaps we should remember it was Panetta that allowed Hollywood access to top secret information to make a movie, that Zero Dark Thirty movie.

According to a June 15, 2011, email from Benjamin Rhodes, Deputy National Security Advisor for Strategic Communications, the Obama White House was intent on “trying to have visibility into the UBL (Usama bin Laden) projects and this is likely a high profile one.”

Image result for Ben rhodes jake sherman photo

Ben Rhodes the aspiring novelist became Obama’s top advisor even when Rhodes security clearance was denied.

In early July 2012, Obama’s senior White House adviser on Iran, Puneet Talwar, and Secretary of State Hillary Clinton’s right-hand man, Jake Sullivan, arrived in the sleepy Arabian sultanate of Oman, 150 miles across sparkling Gulf waters from the Iranian coast. It was the first significant back-channel contact with Tehran.

FNC: A group of about 50 former Obama administration officials recently formed a think tank called National Security Action to attack the Trump administration’s national security policies.

The mission statement of the group is anything but subtle: “National Security Action is dedicated to advancing American global leadership and opposing the reckless policies of the Trump administration that endanger our national security and undermine U.S. strength in the world.”

National Security Action plans to pursue typical liberal foreign policy themes such as climate change, challenging President Trump’s leadership, immigration and allegations of corruption between the president and foreign powers.

This organization uses the acronym NSA, which is ironic. Three of its founding members – Ben Rhodes, Susan Rice and Samantha Power – likely were involved in abusing intelligence from the federal NSA (National Security Agency) to unmask the names of Trump campaign staff from intelligence reports and to leak NSA intercepts to the media to hurt Donald Trump politically. This included a leak to the media of an NSA transcript in February 2017 of former National Security Adviser Michael Flynn’s discussion with Russian Ambassador to the U.S. Sergei Kislyak. No one has been prosecuted for this leak.

Given the likely involvement of Rhodes, Rice and Power to weaponize intelligence against the Trump presidential campaign, will their anti-Trump NSA issue an apology for these abuses?

It is interesting that the new anti-Trump group says nothing in its mandate about protecting the privacy of Americans from illegal surveillance, preventing the politicization of U.S. intelligence agencies or promoting aggressive intelligence oversight. Maybe this is because the founders plan to abuse U.S. intelligence agencies to spy on Republican lawmakers and candidates if they join a future Democratic administration.

It takes a lot of chutzpah for this group of former Obama officials, who were part of the worst U.S. foreign policy in history, to condemn the current president’s successful international leadership and foreign policy.

After all, ISIS was born on President Obama’s watch because of his mismanagement of the U.S. withdrawal from Iraq and his “leading from behind” Middle East policy. The Syrian civil war spun out of control because of the incompetence of President Obama and his national security team.

This was a team that provided false information to the American people about the 2012 terrorist attack on the U.S. consulate in Benghazi and the nuclear deal with Iran. I wonder if the anti-Trump NSA will include videos on its website of former National Security Adviser Susan Rice falsely claiming on five Sunday morning news shows in September 2012 that the attack on the Benghazi consulate was “spontaneous” and in response to an anti-Muslim video.

And of course there’s the North Korean nuclear and missile programs that surged during the Obama years due to the administration’s “Strategic Patience” policy, an approach designed to kick this problem down the road to the next president. Because of President Obama’s incompetence, North Korean dictator Kim Jong Un may have an H-bomb that he soon will be able to load onto an intercontinental ballistic missile to attack the United States.

It must appall this group of former Obama national security officials that President Trump is succeeding as he undoes everything they worked on.

ISIS will soon control no territory in Iraq or Syria because of the Trump administration’s intensified attacks on it and arming of Kurdish militias.

In sharp contrast to President Obama, President Trump drew a chemical weapons red line in Syria and enforced it.

North Korea is pushing for talks with the U.S. in response to strong United Nations sanctions the U.S. worked to obtain in 2017. And compliance with the new sanctions has been significantly improved, especially by China, as the result of President Trump’s actions.

President Trump repaired the damage done to U.S.-Israel relations by President Obama and has recognized Jerusalem as the capital of Israel – something several previous presidents promised but failed to do.

Iranian harassment of U.S. ships in the Persian Gulf stopped in 2017, likely due to the more assertive Iran policy of President Trump. This includes the president’s successful effort to build a stronger U.S. relationship with Saudi Arabia.

President Trump is right when he says he inherited a mess on national security from the Obama administration. This is because President Obama and his national security team undermined U.S. credibility and left President Trump a much more dangerous world. I doubt the new anti-Trump National Security Action think tank will succeed in convincing Americans otherwise.

List of Participants for Fusion GPS and Smear Mission

Senator Grassley is on the case. He listed names asking for all communications from the following people: For the period from March 2016 through January 2017, please provide all communications to, from, copying, or relating to: Fusion GPS; Bean LLC; Glenn Simpson; Mary Jacoby; Peter Fritsch; Tom Catan; Jason Felch; Neil King; David Michaels; Taylor Sears; Patrick Corcoran; Laura Sego; Jay Bagwell; Erica Castro; Nellie Ohr; Rinat Akhmetshin; Ed Lieberman; Edward Baumgartner; Orbis Business Intelligence Limited; Orbis Business International Limited.; Walsingham Training Limited; Walsingham Partners Limited; Christopher Steele; Christopher Burrows; Sir Andrew Wood, Paul Hauser;4 Oleg Deripaska; Cody Shearer; Sidney Blumenthal; Jon Winer; Kathleen Kavalec; Victoria Nuland; Daniel Jones; Bruce Ohr; Peter Strzok; Andrew McCabe; James Baker; Sally Yates; Loretta Lynch; John Brennan. Details here.

Image result for fusion gps hillary What happened? Hey Hillary how about you tell America who coordinated all these people and who was the architect and save a LOT of misery and resources….

*** The political wheels go round and round and given the anti-Trump envoy that has been mobilized, this operation and army of people will continue through the 2020 general election. AG Jeff Sessions and his Justice Department along with his Inspector Generals and Congressional committees are not likely to complete all these investigations any time soon….so remember these names as we head into the mid-term election and to the general election. And we have not even gotten to the whole FBI equation….

1. Shall we start with Kamala Harris? The sister of Sen. Kamala Harris, the California Democrat who has been floated as a potential presidential candidate in 2020, and the political director for the American Civil Liberties Union (ACLU) are also involved with the group.

The Democracy Forward Foundation, a D.C.-based 501(c)3 nonprofit with a 501(c)4 arm called Democracy Forward, describes itself as a “nonpartisan” group that “scrutinizes Executive Branch activity,” according to its mission statement. Anne Harkavy, the group’s executive director, was a senior legal advisor to the general counsel of Obama for America, Obama’s former campaign committee. Corey Ciorciari, its policy and strategy director who oversees Democracy Forward’s policy, research, and communications teams, was a policy advisor for Clinton during her 2016 campaign.

Javier Guzman, the legal director, came from the Department of Justice. Alex Hornbrook, Democracy Forward’s operations director, served as director of scheduling and advance for Hillary for America, Clinton’s campaign committee.

Democracy Forward’s board of directors also features a number of liberal power players.

Elias chairs the board that includes Podesta. Maya Harris, Sen. Kamala Harris’s sister who helped craft Clinton’s agenda for the failed campaign and is a political analyst for MSNBC, is also a member of its board.

Faiz Shakir, who became the national political director of the ACLU in January; Ronald Klain, a Democratic operative who was President Obama’s “Ebola Czar”; Matthew Miller, an MSNBC justice and security analyst; and Scott Nathan, a senior fellow at the Center for American Progress, which was founded by Podesta, also sit on the board of directors. More here.

2. Congressional documents and recently leaked texts between Sen. Mark Warner (D-Va.) and a registered foreign agent for a Russian aluminum oligarch indicate that Daniel J. Jones is intimately involved with ongoing efforts to retroactively validate a series of salacious and unverified memos produced by Christopher Steele, a former British intelligence agent, and Fusion GPS. Jones, a former Feinstein staffer who wrote a controversial top-secret report on alleged torture by the Central Intelligence Agency (CIA), currently runs the Penn Quarter Group, which bills itself as a “research and investigative advisory” and is inconspicuously named after the downtown Washington DC neighborhood where its office is located.

3. How about Shailagh Murray, a former journalist who served as senior adviser to Obama and as former Vice President Joe Biden’s deputy chief of staff? Murray’s husband is Neil King, a former Wall Street Journal reporter who worked at the newspaper at the same time as Fusion GPS’s three co-founders, Glenn Simpson, Peter Fritsch, and Tom Catan. Murray also worked at The Journal until 2005. She joined the Obama administration in 2011. Devin Nunes also sent a letter and questionnaire to Colin Kahl, who served as national security adviser to Biden.

4. Okay, what about CNN ad Evan Perez? Perez covers the Justice Department for CNN. Glenn Simpson, the Fusion co-founder most often associated with the dossier, is used to working on stories with Perez. As reporters at The Wall Street Journal, Perez and Simpson regularly co-authored stories on national security. Another Fusion founder, Tom Catan, worked as a reporter for the Journal at the same time as Perez and Simpson. The third Fusion co-founder, Peter Fritsch, worked above Perez and Simpson as the senior national security editor. Details and evidence is here.

5. Seems Marc Elias as the chair of Perkins Coie’s Political Law Group, was/is the grand marshal of this operation. Marc served as general counsel to Hillary for America, Hillary Rodham Clinton’s presidential campaign in 2016. He served in the same role for John Kerry’s presidential campaign in 2004. His political committee clients include the Democratic National Committee, Democratic Senatorial Campaign Committee, Democratic Congressional Campaign Committee, Democratic Governors Associations, National Democratic Redistricting Committee, Priorities USA, Senate Majority PAC, House Majority PAC and EMILY’s List. He currently serves as the chair of two organizations: Democracy Forward and We the Action. He serves on the board of directors of Priorities USA and on the advisory board of Let America Vote and Access Democracy. Marc is the former co-chair of the bipartisan Committee to Modernize Voter Registration. Marc served on the American Bar Association’s Standing Committee on Election Law and as an adviser to two American Law Institute projects: Principles of Government Ethics and Principles of Election Law: Resolution of Election Disputes.

Hillary Clinton’s campaign lawyer Marc Elias, allegedly denied media reports that the Clinton campaign had any connection to the controversial Russian Dossier.  After the Washington Post ran an extensive story on how the Clinton Campaign and Democratic National Committee hired controversial research firm Fusion GPS to dig up dirt on Donald Trump in Russia in the “Russian Dossier” matter.  Reporters at the New York Times have accused Elias of lying in past categorical denials of any connection to Clinton or the DNC.  The reports indicate that not only did the Clinton team fund the opposition research but that Elias may have been the person handling much of the arrangements.  Now Elias’ position has worsened after a report out of Congress that he was present in an interview when campaign chairman John Podesta denied any campaign role in the funding or acquisition of the dossier.

Here is the nut of the report:
“Podesta was asked in his September interview whether the Clinton campaign had a contractual agreement with Fusion GPS, and he said he was not aware of one, according to one of the sources. Sitting next to Podesta during the interview: his attorney Marc Elias, who worked for the law firm that hired Fusion GPS to continue research on Trump on behalf of the Clinton campaign and DNC, multiple sources said. Elias was only there in his capacity as Podesta’s attorney and not as a witness.”
If this and the earlier report is true, Elias not only falsely denied any connection between the Clinton campaign and the dossier to two New York Times reporters but sat silently as Podesta gave false information to congressional investigators.

 

The war on 5G Nationally and Internationally

The first, 1G, was invented by Motorola in 1973. The 1G networks provided basic phone service with analog protocols and speeds of 2.4 kilobits per second. Compare that to today’s 4G network speed of 100 megabits per second and 5G’s proposed 100 gigabits per second. Also in 1973, IEEE Member Robert M. Metcalf invented Ethernet, one of the key enablers of wireless and local Internet access. Ethernet is part of the IEEE 802 suite of standards that underpins wireless networking applications and includes access to the Internet. The 802.11 standard is better known by its trademark name: Wi-Fi. More here.

***

When fourth generation (4G) services launched early this decade, the U.S. led the way. The Federal Communications Commission (FCC) unlocked valuable spectrum, and carriers responded by accommodating a radical, 20-fold growth in global mobile data traffic. The massive investment in wireless network infrastructure rewarded American consumers with faster wireless speeds at affordable prices. In addition to speeding up smartphones in our pockets, the U.S. economy saw an estimated increase in GDP between $73–$151 billion and up to 700,000 new jobs as a result and America was established as the test bed for innovation in the global digital economy.

Now our country faces a similar opportunity and challenge with fifth generation (5G) mobile networks, and it warrants the attention of consumers, the mobile industry, and policymakers. The economic stakes for 5G may be significantly higher than for 4G, led by large-scale job creation and incubation of new devices, applications, and business models that could dramatically stimulate the U.S. economy. More here.

***

As of 2017, development of 5G is being led by several companies, including Samsung, Intel, Qualcomm, Nokia, Huawei, Ericsson, ZTE and others. Huawei and ZTE are part of the Chinese government and all our intelligence agencies have declared they are NOT safe to use in the government realm or the private sector. Canadian media is warning the same due to cyber vulnerabilities. This is all about the expanding digital economy where various cyber currencies will prevail over tangible currency and those respective values cannot be controlled or managed.

***  Image result for 5g photo

President Donald Trump signed an executive order in January calling on federal agencies “to use all viable tools” to build broadband in rural areas on federal lands.

“Those towers are going to go up, and you’re going to have great, great broadband,” Trump said.

But telecom companies don’t have plans to expand 5G to rural areas. Where are they going? To urban and suburban neighborhoods where the business-friendly FCC is considering rules that would limit local governments from having as much of a say over where they go, how they look and how much they can charge for use of public property. Published in partnership with the New York Times 

Small cells, the next generation of wireless technology that telecommunications firms and cell-tower builders want to place on streetlights and utility poles throughout neighborhoods nationwide. The small cells come with a host of equipment, including antennas, power supplies, electric meters, switches, cabling and boxes often strapped to the sides of poles. Some may have refrigerator-sized containers on the ground. And they will be placed about every 500 or so feet along residential streets and throughout business districts.

Telecom companies say the cells will be both unobtrusive and safe, and insist the technology is needed to bring faster internet speeds required by a more connected world.

Telecommunications companies say the current 4G network is becoming overloaded as more people stream more videos and use more data-heavy apps. The advent of driverless cars, smart homes, telemedicine and virtual-reality will create more demand on wireless networks, requiring more bandwidth and faster speeds.

What’s needed, the wireless industry says, is 5G. The next generation network, still in development, is a combination of advanced hardware and standards such as distributed antenna systems, more fiber-optic cable, new data management practices and higher frequencies that will enable the network to carry more data up to 100 times faster than 4G.

5G will depend on so-called millimeter waves. These high-frequency bands, however, don’t travel as far as the signals 4G relies on and are easily blocked by walls, trees and even rain. So the network needs to be dense, with cells placed much closer together. That means way more wireless facilities. More than 300,000 cells are now in operation nationwide, and estimates for the number of small cells needed to make 5G work range from hundreds of thousands to millions more.

The rollout of 5G will be evolutionary, with the standards for the full complement of advanced technologies expected after 2020. Small cells already are being erected with 5G tests in many cities, and as that’s happened, citizens have descended on government meetings to express their anger — from  Woodbury, New York; to Liberty Township, Ohio; to Charlotte; to Pasco County, Florida; to Olympia, Washington.

5G promises to generate huge profits for the wireless companies, with as much as $250 billion in service revenue expected annually by 2025. And 5G will unleash an economic boom, say supporters of pre-empting local rules. They frequently cite a report by the consulting firm Accenture, which concluded that wireless firms will invest $275 billion over the next seven years deploying small cells, creating 3 million jobs and eventually boosting the national economy by $500 billion annually.

The study appears everywhere — mentioned by FCC commissioners in speeches, cited in an official FCC docket, in wireless carriers’ comments, and in statements by the powerful Washington associations that represent them. What most don’t mention is that the study was paid for by the wireless association CTIA, one of Washington’s top lobbying spenders.

The wireless industry argues that localities’ high fees, design requirements and delays in processing permits have effectively prohibited the deployment of broadband, which they argue is a violation of federal law; they’ve asked the FCC to make that clear in reining in cities and counties.

Wireless carriers and the companies that build towers for them have begun flooding city and county permitting offices with applications for attaching small cells to poles and building new ones. Cities that normally see a few dozen such applications yearly began in 2016 to get hundreds, such as Houston.  Montgomery County said it had at one point more applications filed in four months than in the previous 18 years.

Wireless companies complain local governments can’t process the permits fast enough because their systems are set up to review applications for massive cell towers, not the small cells they claim are less intrusive. The process needs to move quickly, they say, because 5G requires so many more cells, and they want to beat other countries to set standards.

The FCC issued a notice in April that it would consider rules to streamline cell deployment by reducing the time cities’ and counties’ have to review applications. The agency also said it would study, with the possibility of proposing rules later, both how the FCC could limit cities’ requirements on the look and design of small cells, and if local fees to attach to poles are excessive. The FCC also asked for ways it could amend its own rules. The agency may consider the proposals by the summer.

Pai, a former attorney for Verizon, also created last year a committee of representatives mostly from the wireless industry to develop model codes that cities and counties can adopt to speed the permitting of small cells and to reduce costs to telecoms. The committee is considering proposals, which it plans to formally submit to the FCC later this spring, that run the gamut, from simply calling on cities and the wireless industry to work together to controversial recommendations such as capping what cities charge to attach to public property.

Mayor Sam Liccardo of San Jose, California, one of the few members on the committee representing local interests and who has been critical of wireless companies’ efforts to weaken local rules, resigned from the group in January, saying the wireless industry “has sought to create a set of rules that will provide it with easy access to publicly-funded infrastructure at taxpayer-subsidized rates, without any obligation to provide broadband access to underserved residents.”

In response, Pai said in a statement that the committee has “brought together 101 participants from a range of perspectives” and he looks forward to working with the committee and others “to remove regulatory barriers to broadband deployment and to extend digital opportunity to all Americans.”

Bipartisan agreement

Congress is also weighing in — in rare bipartisan fashion — on the side of the telecom firms. Numerous bills in both the Senate and House would ease regulations and fees for erecting cells on federal lands, such as a bill the Senate passed last summer that would exempt certain small-cell deployments from environmental and historic reviews. The bill, which the House has yet to consider, is sponsored by South Dakota Sen. John Thune, the Republican chairman of the Commerce, Science and Transportation committee, and Sen. Bill Nelson, D-Fla., the ranking member of the committee.

Also last year, Thune joined Democratic Sen. Brian Schatz from Hawaii to circulate a draft bill that rolls back local government control over wireless facilities including small cells, including shortening the permit review times to 60 days on applications to collocate wireless facilities and 90 days for other wireless applications — the same time frames wireless providers are asking the FCC to consider.

Sens. Roger Wicker, R-Miss., and Catherine Cortez Masto, D-Nev., introduced a bill that would exempt small cells being deployed in a public right of way from environmental and historical reviews under certain circumstances. A companion bill is in the House. Numerous other bills are moving through the House

Wicker and Thune are among the top 25 senators who have received the most campaign contributions from AT&T and Verizon since 2010, pulling in $32,500 and $30,500, respectively, according to the Center for Responsive Politics. Schatz has received $29,000 from the two carriers, the third most among senators since 2014, when he ran his first campaign.

With such bipartisan support in Congress, and with an FCC that is sympathetic to telecoms, cities view their control over small cells as slipping away. That leaves people like King resigned to what is coming.

“A Russian woman stood up to speak at one of these public meetings, and she said that when she lived in Russia, the government slam dunked her and she had no say,” King said. “Now she lives in the United States of America, where she’s getting slam dunked by the government and she has no say. That gives you a window into what’s going on here.”

 

Apple, China and iCloud Data Safety?

Primer: Pegatron, the factory at the corner of Xiu Yan and Shen Jiang roads is one of the most secretive facilities at the heart of iPhone production and covers an area equal to almost 90 football fields. In the center is a plaza with a firehouse, police station and post office. There are shuttle buses, mega-cafeterias, landscaped lawns and koi ponds. The grey and brown-hued concrete buildings are meant to evoke traditional Chinese architecture. The brand-new Shanghai Disneyland, which opens its doors in June, is a 20-minute drive away.

Inside, the factory still hides a secret, according to China Labor Watch. Base pay remains so low that workers need overtime simply to make ends meet, the advocacy group said. It said 1,261 pay stubs from Pegatron’s Shanghai facility from September and October 2015 show evidence of excessive overtime. Pegatron, an Asustek spinoff, is the world’s biggest contract electronics manufacturer after Foxconn, according to Bloomberg Intelligence. More here.

Image result for pegatron china apple photo

Image result for icloud china apple photo

This Wednesday, Apple will be making some significant changes to how data is stored for users of its iCloud service in China – raising major concerns that the Chinese authorities will now be able to freely monitor Apple’s users in China. This may be quite worrying for he population and may remind you of the iCloud breach on 31 August 2014. Ever since then, people have been very sceptical of storing precious information online and have been purchasing services from businesses like http://www.thefinalstep.co.uk/ to protect their data from any hackers.

Apple has a reputation for being a powerful advocate for privacy and security. The company uses strong encryption by default in its services and grabbed headlines when it appealed a US court order that would allow the FBI to get around the phone’s security. Apple CEO Tim Cook even sent all Apple consumers a personal letter explaining the importance of privacy.

With China, however, a different story has emerged. Apple has been criticised for blocking Chinese users’ access to the Apple News app and for removing VPN apps from the App Store in China. The changes being made to iCloud are the latest indication that China’s repressive legal environment is making it difficult for Apple to uphold its commitments to user privacy and security. What do these changes mean and what options do Apple’s customers have to protect themselves?

  1. What is happening to Apple’s iCloud service in China?

On 28 February, Apple will transfer operation of its iCloud service for Chinese users to a Chinese company, Guizhou-Cloud Big Data Industry Development Co., Ltd (“GCBD”). The concept of iCloud and other Cloud computing services can be quite confusing to some, especially if it is something completely new to you. It is very interesting to look into. As many of us use services like this to store our files and photos, it makes sense to know what this is all about. Why not look into a site like https://www.salesforce.com/what-is-cloud-computing/ to stay informed.

The move will affect any photos, documents, contacts, messages and other user data and content that Chinese users store on Apple’s cloud-based servers. New Chinese legislation enacted in 2017 requires cloud services to be operated by Chinese companies, meaning companies like Apple must either lease server space inside China or establish joint ventures with Chinese partners.

  1. How does storing user data in China put individuals at risk?

Domestic law gives the Chinese government virtually unfettered access to user data stored inside China without adequate protection for users’ rights to privacy, freedom of expression or other basic human rights. Chinese police enjoy sweeping discretion and use broad and ambiguously constructed laws and regulations to silence dissent, restrict or censor information and harass and prosecute human rights defenders and others in the name of “national security” and other purported criminal offences. As a result, Chinese Internet users can face arrest and imprisonment for merely expressing, communicating or accessing information and ideas that the authorities don’t like.

Furthermore, China’s Cyber Security Law requires network operators to provide “technical support and assistance” to law enforcement and state security agents. That means that when the authorities come to GCBD requesting information about an iCloud user for the purposes of a criminal investigation, the company has a legal obligation to provide it and few, if any, viable legal avenues to challenge or refuse the request.

  1. Apple says it has control over encryption keys and that it won’t allow backdoors. Won’t that protect users in China?

It all depends on the circumstances under which the company will allow GCBD – and the Chinese authorities – access to intelligible decrypted data on iCloud users. When users accept the terms of service for iCloud in China, they agree to allow their information and content to be turned over to law enforcement “if legally required to do so”. Significantly, from now on Apple will store the encryption keys for Chinese users in China, not in the US – making it all but inevitable that the company will be forced to hand over decrypted data so long as the request complies with Chinese law.

Given that many provisions of Chinese law offer inadequate protection to privacy, freedom of expression and other rights, simply checking whether government information requests comply with Chinese law doesn’t address whether complying with the request might contribute to human rights violations. Apple hasn’t confirmed whether or how it will assess whether government information requests might violate users’ human rights. We won’t really know how Apple will respond until it’s put to the test, and unfortunately that’s probably just a matter of time.

As for “backdoors”, or technical measures that would allow law enforcement or other government agencies to access unencrypted user data without having to ask for it, Apple’s commitment to prevent their use is admirable. But the commitment is meaningless if law enforcement can get the companies to decrypt user information simply by saying that it is for a criminal investigation.

  1. What should iCloud users inside China do to protect themselves?

The best way to protect your personal information from being accessed by the Chinese government is to avoid storing it on servers inside China. Users with a credit card and billing address outside China can use those to register their accounts and keep storing their iCloud data outside China. Otherwise, the only option available to Chinese users is to delete their iCloud accounts and permanently opt out of the service. (Apple has provided instructions for how to do so here.) Individual users should seriously consider the risks involved and come to their own decision, but Apple should protect Chinese users by switching iCloud off by default and giving users very clear warnings about the risks they may face by opting in to the service.

  1. How can ICT companies act responsibly when operating in China?

Companies have a responsibility to respect all human rights wherever they operate in the world. Users of their products and services need to be given clear and specific information about risks they might face to their privacy and freedom of expression in China, and what action the company is taking in response. Companies should carry out regular and verifiable human rights impact assessments and demonstrate publicly that they have oversight, due diligence and accountability measures in place to ensure respect for human rights. Finally, companies should do everything they can to influence the Chinese government to protect and respect human rights and speak up and challenge government actions when they threaten human rights. If a company finds that it is unable to mitigate the high risk of human rights violations, it may be forced to decide not to operate in China.

Apple’s official website declares: “At Apple, we believe privacy is a fundamental human right.” It remains to be seen whether Apple can put its words into action.

Do the Russians have the Voting Machines Source Codes?

On February 28th, the Senate asks what NSA and Cyber Command are doing about Russian election interference. Admiral Rogers’s answer, in brief, is that his organizations lack the authorities to do much (that he can openly discuss, that is).

US senator grills CEO over the myth of the hacker-proof voting machine
Nation’s biggest voting machine maker reportedly relies on remote-access software.

WASHINGTON (Reuters) – Two Democratic senators on Wednesday asked major vendors of U.S. voting equipment whether they have allowed Russian entities to scrutinize their software, saying the practice could allow Moscow to hack into American elections infrastructure.

The letter from Senators Amy Klobuchar and Jeanne Shaheen followed a series of Reuters reports saying that several major global technology providers have allowed Russian authorities to hunt for vulnerabilities in software deeply embedded across the U.S. government.

The senators requested that the three largest election equipment vendors – Election Systems & Software, Dominion Voting Systems and Hart Intercivic – answer whether they have shared source code, or inner workings, or other sensitive data about their technology with any Russian entity.

They also asked whether any software on those companies’ products had been shared with Russia and for the vendors to explain what steps they have taken to improve the security of those products against cyber threats to the election.

The vendors could not immediately be reached for comment. It was not immediately clear whether any of the vendors had made sales in Russia, where votes are submitted via written ballots and usually counted by hand.

“According to voting machine testing and certification from the Election Assistance Commission, most voting machines contain software from firms which were alleged to have shared their source code with Russian entities,” the senators wrote. “We are deeply concerned that such reviews may have presented an opportunity for Russian intelligence agents looking to attack or hack the United States’ elections infrastructure.”

U.S. voters in November will go to the polls in midterm elections, which American intelligence officials have warned could be targeted by Russia or others seeking to disrupt the process.

There is intense scrutiny of the security of U.S. election systems after a 2016 presidential race in which Russia interfered, according to American intelligence agencies, to try to help Donald Trump win with presidency. Trump in the past has been publicly skeptical about Russian election meddling, and Russia has denied the allegations.

Twenty-one states experienced probing of their systems by Russian hackers during the 2016 election, according to U.S. officials.

Though a small number of networks were compromised, voting machines were not directly affected and there remains no evidence any vote was altered, according to U.S. officials and security experts.

Related reading:

Top intel official says US hasn’t deterred Russian meddling (Fifth Domain) “I believe that President (Vladimir) Putin has clearly come to the conclusion that there’s little price to pay and that therefore, ‘I can continue this activity,‘” Adm. Mike Rogers, director of both the U.S. Cyber Command and the National Security Agency, told Congress.

Senators: Cyber Command should disrupt Russian influence campaigns (Fifth Domain) Senators pressed Cyber Command on how they can use their national mission force to combat Russian cyber intrusions.

Rogers: CyberCom lacks authority, resources to defend all of cyberspace (FCW) The outgoing NSA and U.S. Cyber Command chief told lawmakers CyberCom is not sitting on its hands when it comes to potential Russian cyber interference, but it lacks the authority to do more absent additional presidential direction.

NSA: Trump’s Lukewarm Response on Russia Will Embolden Putin (Infosecurity Magazine) NSA: Trump’s Lukewarm Response on Russia Will Embolden Putin. Expect more election interference, Cyber Command boss warns

Decoding NSA director Mike Rogers’ comments on countering Russian cyberattacks (Washington Examiner) It’s not as simple as ‘I’m not authorized to do anything.’

*** Footnotes:

Electronic Systems and Software:

1. In 2014, ES&S claimed that “in the past decade alone,” it had installed more than 260,000 voting systems, more than 15,000 electronic poll books, provided services to more than 75,000 elections. The company has installed statewide voting systems in Alabama, Arkansas, Georgia, Idaho, Iowa, Maine, Maryland, Minnesota, Mississippi, Montana, Nebraska, New Mexico, North Carolina, North Dakota, Rhode Island, South Carolina, South Dakota, and West Virginia. ES&S claims a U.S. market share of more than 60 percent in customer voting system installations.

The company maintains 10 facilities in the United States, two field offices in Canada (Pickering, Ontario; and Vancouver, British Columbia) and a warehouse in Jackson, Mississippi.

2. Dominion Voting Systems is a global provider of end-to-end election tabulation solutions and services. The company’s international headquarters are in Toronto, Canada, and its U.S. headquarters are in Denver, Colorado. Dominion Voting also maintains a number of additional offices and facilities in the U.S. and Europe.

Dominion’s technology is currently used in 33 U.S. states, including more than 2,000 customer jurisdictions. The company also has 100+ municipal customers in Canada.

3. Hart InterCivic Inc. is a privately held United States company that provides elections, and print solutions to jurisdictions nationwide. While headquartered in Austin, Texas, Hart products are used by hundreds of jurisdictions nationwide, including counties in Texas, the entire states of Hawaii and Oklahoma, half of Washington and Colorado, and certain counties in Ohio, California, Idaho, Illinois, Indiana, Kentucky, Oregon, Pennsylvania, and Virginia.

Hart entered the elections industry in 1912, printing ballots for Texas counties. (Side note: As Republican and Democratic state legislators hustle to pass a law moving Georgia toward paper ballot voting technology, election integrity advocates said they’re concerned a bill that already cleared the state Senate could lead to a new vulnerability in Georgia’s next voting system, if it becomes law.

One way a new system might work is through a touchscreen computer similar to those currently used in Georgia. It would print a paper ballot with a visual representation of a voter’s choices so they themselves can check for accuracy.

In some systems, counting the votes means scanning an entire image of the ballot that may include a timestamp and precinct information.

In other systems, barcodes or QR codes on a ballot would correspond with the voter’s choices, which can make counting easier and faster for election officials, said Peter Lichtenheld, vice president of operations with Hart Intercivic, one of several election technology companies that hired lobbyists at the statehouse this year.)

*** The text of the letter to the three vendors is below:

The full text of the senators’ letter is below:

Dear Mr. Braithwaite, Mr. Burt, and Mr. Poulos:

Recent reports of U.S. IT and software companies submitting to source code reviews in order to access foreign markets have raised concern in Congress given the sensitivity of the information requested by countries like China and the Russian Federation. As such, we write to inquire about the security of the voting machines you manufacture and whether your company has been asked to share the source code or other sensitive or proprietary details associated with your voting machines with the Russian Federation.

The U.S. intelligence community has confirmed that Russia interfered with the 2016 presidential elections. As a part of a multi-pronged effort, Russian actors attempted to hack a U.S. voting software company and at least 21 states’ election systems. According to the Chicago Board of Elections, information on thousands of American voters was exposed after an attack on their voter registration system.

Foreign access to critical source code information and sensitive data continues to be an often overlooked vulnerability. The U.S. government and Congress have recently taken steps to address some cyber vulnerabilities, including by banning the use Kaspersky Lab, a Moscow-based cybersecurity firm that has maintained a relationship with Russia’s military and intelligence sectors, from all U.S. government computers. Now, we must also ensure the security of our voting machines and associated software.

Recent reports indicate that U.S. based firms operating on U.S. government platforms gave Russian authorities access to their software. In order to sell their software within Russia, these companies allowed Russian authorities to review their source code for flaws that could be exploited. While some companies maintain this practice is necessary to find defects in software code, experts have warned that it could jeopardize the security of U.S. government computers if these reviews are conducted by hostile actors or nations. U.S. tech companies, the Pentagon, former U.S. security officials, and a former U.S. Department of Commerce official with knowledge of the source code review process have expressed concerns with this practice.

In addition, Russia’s requests for source code reviews have increased. According to eight current and former U.S. officials, four company executives, three U.S. trade attorneys, and Russian regulatory documents, between 1996 and 2013 Russia conducted reviews for 13 technology products from Western companies, but has conducted 28 such reviews in the past three years alone.

As the three largest election equipment vendors, your companies provide voting machines and software used by ninety-two percent of the eligible voting population in the U.S. According to voting machine testing and certification from the Election Assistance Commission, most voting machines contain software from firms which were alleged to have shared their source code with Russian entities. We are deeply concerned that such reviews may have presented an opportunity for Russian intelligence agents looking to attack or hack the United States’ elections infrastructure.  Further, if such vulnerabilities are not quickly examined and mitigated, future elections will also remain vulnerable to attack.

In order to help the security and integrity of our systems and to understand the scope of any potential access points into our elections infrastructure, we respectfully request answers to the following questions:

  1. Have you shared your source code or any other sensitive data related to your voting machines or other products with any Russian entity?
  2. To your knowledge, has any of the software that runs on your products been shared with any Russian entity?
  3. What steps have you taken or will you take in order to upgrade existing technologies in light of the increased threat against our elections?

The 2018 election season is upon us. Primaries have already begun and time is of the essence to ensure any security vulnerabilities are addressed before 2018 and 2020.

Thank you for your attention to this matter, and we look forward to working with you to secure our elections.

Sincerely,