An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
Fascinating speakers from private industry, state government and the Federal government describe where we are, the history on cyber threats and how fast, meaning hour by hour the speed at which real hacks, intrusions or compromise happen.
David Hoge of NSA’s Threat Security Operations Center for non-classified hosts worldwide describes the global reach of NSA including the FBI, DHS and the Department of Defense.
When the Federal government spent $76 billion in 2017 and we are in much the same condition, Hoge stays awake at night.
With North Korea in the constant news, FireEye published a report in 2017 known as APT37 (Reaper): The Overlooked North Korea Actor. North Korea is hardly the worst actor. Others include Russia, China, Iran and proxies.
Targeting: With North Korea primarily South Korea – though also Japan, Vietnam and the Middle East – in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare.
Initial Infection Tactics: Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyber espionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately.
Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.
Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time.
Malware: A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.
More information on this threat actor is found in our report, APT37 (Reaper): The Overlooked North Korean Actor.
NPPD’s vision is a safe, secure, and resilient infrastructure where the American way of life can thrive. NPPD leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure.
*** Going forward as devices are invented and added to the internet and rogue nations along with criminal actors, the industry is forecasted to expand with experts and costs.
Research reveals in its new report that organizations are expected to increase spending on IT security by almost 9% by 2018 to safeguard their cyberspaces, leading to big growth rates in the global markets for cyber security.
The cyber security market comprises companies that provide products and services to improve security measures for IT assets, data and privacy across different domains such as IT, telecom and industrial sectors.
The global cyber security market should reach $85.3 billion and $187.1 billion in 2016 and 2021, respectively, reflecting a five-year compound annual growth rate (CAGR) of 17.0%. The American market, the largest segment, should grow from $39.5 billion in 2016 to $78.0 billion by 2021, demonstrating a five-year CAGR of 14.6%. The Asia-Pacific region is expected to grow the fastest among all major regions at a five-year CAGR of 21.4%, due to stringent government policies to mitigate cyber threats, and a booming IT industry.
Factors such as the growing complexity and frequency of threats, increasing severity of cyber security, stringent government regulations and compliance requirements, ubiquity of online communication, digital data and social media cumulatively should drive the market. Moreover, organizations are expected to increase IT spending on security solutions and services, as well. Rising adoption of technologies such as Internet of things, evolution of big data and cloud computing, increasing smartphone penetration and the developing market for mobile and web platforms should provide ample opportunities for vendors.
By solution type, the banking and financial segment generated the most revenue in 2015 at $22.2 billion. However, the defense and intelligence segment should generate revenues of $50.7 billion in 2021 to lead all segments. The healthcare sector should experience substantial growth with an anticipated 16.2% five-year CAGR.
Network security, which had the highest market revenue in 2015 based on solution type, should remain dominant through the analysis period. Substantial growth is anticipated in the cloud security market, as the segment is expected to have a 27.2% five-year CAGR, owing to increasing adoption of cloud-based services across different applications.
“IT security is a priority in the prevailing highly competitive environment,” says BCC Research analyst Basudeo Singh. “About $100 billion will be spent globally on information security in 2018, as compared with $76.7 billion in 2015.”
Imagine the other cities in Iraq and Syria. Mosul was part of Assyria as early as the 25th century BC. Of note, in 2008, there was a sizeable exodus of Assyrian Christians. They sought sanctuary in Syria and Turkey due to threats of murder unless they converted to Islam.
MOSUL, Iraq — In March, VICE News returned to Mosul for the first time since the war against ISIS was declared over eight months ago.
While life may be returning to normal in the eastern half of the city, on the other side of the river — where the fighting was most intense — the scale of rebuilding that needs to be done is monumental. It’s estimated there are still 8 million tons of conflict debris that need to be moved before reconstruction can start, equivalent to three times the size of the Great Pyramid of Egypt. About 75 percent of that rubble is in West Mosul, and it’s mixed with so much unexploded ordnance that experts say this is now one of the most contaminated spots on the planet.
In the Old City, where ISIS made its last stand, residents have slowly started to come back – a few business owners hoping to repair shops, and families who have no other option but to live in their damaged homes. Some water tanks have been trucked in, and electricity cables have been temporarily patched together along some streets, but the place feels deserted, and in some ways the scene was not that different from how it looked shortly after the fighting.
Eight months on, there are hundreds or perhaps thousands of bodies still under the rubble, making life unbearable for the families who have returned.
The putrefied corpses are mainly Islamic State fighters or their families, since many of the non-ISIS civilian bodies have been dug out and reclaimed by family members or civil defense workers. The bodies that remain are a severe health hazard, but there’s little political will to deal with them, and removing them is risky given the unexploded munitions littering the area. Nevertheless, teams of citizen volunteers are going house-to-house carrying out this gruesome, dangerous work on a daily basis.
**
One volunteer team is led by Sroor al-Hosayni, a 23-year-old former nurse. Many of her group are even younger; some are medical students, but most have no formal training in handling corpses. So far, they say they’ve pulled and bagged more than 350 bodies that no one else was willing to deal with. They laid them in white plastic body bags where municipal trucks can easily collect them, labeling them for any potential explosives found with the corpse.
“We saw that there were bodies everywhere, in the alleys and inside the houses,” Hosayni said. “I took my team and started implementing this idea by going to help municipality and government workers in removing these bodies before summer comes and disease spreads in the city.”
At first the authorities complained, telling her: “‘You don’t have to move ISIS bodies. Leave them there; the dogs will eat them.”
Hosayni replied, “But one or two dogs can’t eat them; there are thousands of bodies.”
A suspected execution room inside the basement of a collapsed building Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team say there are more than 100 rotting corpses here. So far they have pulled more than 30 bodies from this room n the last few weeks. (Adam Desiderio/VICE News)
After filming Hosayni’s team at work near the destroyed Al Nuri mosque, we followed them to Al Maydan — the Old City neighborhood where ISIS made its last stand — where they had been working on one particular site for weeks.
Bulldozers have started clearing a path where Souk Al-Samak Street once ran along the river, but almost nothing else has changed since the air bombardment flattened this district.
The ruins of arched and intricately carved stone doorways open onto inner courtyards like dioramas of the war, frozen in time: Human corpses in varying degrees of decay lying amid stray ordnance, broken china, plastic toy trucks, and discarded military apparel.
Two hundred yards up the street and on the right, the team pointed us to a building on the banks of the Tigris River. Scrambling through the collapsed masonry, we emerged into two mostly intact basement rooms with barred windows looking out onto the river. In the far room, buzzing with flies and inescapable stench, were dozens and dozens of corpses, stacked too deep to count, one on top of another. It seemed to be the remains of a mass execution.
The body collectors told us there were at least 100 bodies in here; the team had already cleared more than 30 but had barely made a dent in the mound of corpses.
23 year-old Sroor al-Hosayni, a former nurse, leads a team of volunteer body collectors pulling corpses out of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team of volunteers have been pulling bodies from what they say is an execution room in the basement of this building. (Adam Desiderio/VICE News)
We saw what appeared to be the bodies of children, though it was difficult to verify given the level of decay. We saw no weapons or military gear on the bodies. The team told us they could see bullet wounds to their heads.
There are reports that ISIS locked large numbers of people in rooms like this, using them as human shields during the final days of the conflict. Many of those families died in coalition airstrikes — but this room was intact. It’s possible they could have been executed by ISIS fighters as government forces closed in. But it’s not clear why ISIS would kill or dispose of civilians in this way.
There are also reports of Iraqi forces executing captured ISIS members in this exact neighborhood. Beards and long hair were still visible on some of the corpses, leading the body collectors to believe some could be men who may have been affiliated with ISIS. But speaking to VICE, a senior Iraqi military official rejected any notion that Iraqi forces may have been responsible for the killings and told us that the site had already been investigated, without providing further details.
One international organization that has documented instances where Iraqi security forces have been accused of carrying out executions is Human Rights Watch.
Belkis Wille, the lead Iraq investigator at Human Rights Watch, visited the site soon after we did. She told us she was unaware of any investigation having been done at this particular site, and that — whoever was responsible for the deaths — the removal of evidence was troubling given that this was potentially the site of a war crime.
**
“Sites like that need the proper forensic teams securing the site and conducting the analysis needed to determine whether this is indeed the site of a crime,” Wille told VICE News. “Despite promises by the prime minister at the end of the battle to investigate abuses, we haven’t seen any sign of that leading to teams coming in and doing the investigations necessary. And the question really is, at what point do these sites potentially lose their forensic value and lose the evidence?”
Inside the remains of Great Mosque of al-Nuri in Mosul, Iraq where ISIS leader Abu Bakr al-Baghdadi declared an Islamic State caliphate in 2014. (Adam Desiderio/VICE News)
But for the body collectors — and for many residents of Mosul — with the heat of summer approaching, the overwhelming priority right now is to clean up this city and begin rebuilding. The need to properly document and investigate potential war crimes isn’t at the top of the agenda.
“It’s time to focus on the living, not the dead,” was the mantra we heard from authorities and from many families trying to rebuild their shattered lives.
Nevertheless, the question of what happened in neighborhoods like Al Maydan and others in those final stages before victory was announced, and in the days shortly afterward, refuses to disappear.
In the ultimate stages of the battle to extinguish the last pockets of ISIS from Mosul last summer, access to the “fight zone” became increasingly restricted.
Baghdad declared the conflict officially over on July 10. The announcement, broadcast live on state television, came as a surprise to many, since there were explosions and gunfire still echoing out from the Old City where the last dregs of the Islamic State terrorist group were refusing to surrender.
Just a day before that, VICE News was one of the few outlets that managed to get past the cordon to join a general from Iraq’s elite counterterrorism brigade and an advance team of his men as they carefully picked their way across the booby-trapped rooftops of collapsed buildings in the district of Al Maydan to plant an Iraqi flag on the banks of the Tigris.
It was a journey through hell. The neighborhood had been pulverized by airstrikes and shelling throughout the campaign, but the intensity had grown as ISIS fell back to these ancient, narrow streets lined with buildings dating back to the 12th century. There was hardly a structure still intact, ordnance and bodies lined the route, some fresh, some bloated and badly decomposed from days or weeks in the sun.
Reaching the river was a symbol of having decisively broken through ISIS defensive lines, a long-awaited moment of triumph for the soldiers. But as the flag was raised and the soldiers took selfies, gunfire from a sniper still alive among the rubble sent the party scattering for cover. In those final days, as different units of Iraq’s security forces held impromptu victory celebrations after liberating neighborhoods, the question lingered of what the end of hostilities actually looks like when the enemy is hell-bent on fighting to the death.
We will likely never know who killed the people in the basement room of the house on Al-Samak Street — but as long as claims persist that extrajudicial killings by Iraqi security forces may have taken place, the stakes of not investigating those could be high. While there is little sympathy for ISIS right now in the devastated neighborhoods of Mosul, a culture of impunity for any abuses that were committed could set the stage for the same kinds of grievances that contributed to the group’s rise in the first place.
Cover image: The basement of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Volunteers have been pulling bodies from what they say is an execution room filled with more than 100 corpses in the basement of this building. (Adam Desiderio/VICE News)
The Global Magnitsky Act enables the United States to sanction the world’s worst human rights abusers and most corrupt oligarchs and foreign officials, freezing their U.S. assets and preventing them from traveling to the United States. Sanctioned individuals become financial pariahs and the international financial system wants nothing to do with them.
Before proceeding, ask yourself: is Global Magnitsky right for my case? The language of the Global Magnitsky Act as passed by Congress was ex-panded by Executive Order 13818, which is now the implementing authority for Global Magnitsky sanctions. EO 13818 stipulates that sanctions may be considered for individuals who are engaging or have engaged in “serious human rights abuse” against any person, or are engaging or have en-gaged in “corruption.” Individuals who, by virtue of their rank, have ordered others to engage or have facilitated these acts also are liable to be sanctioned.
Keep in mind that prior to the EO’s expansion of the language, human rights sanctions were limited to “gross violations of internationally recognized human rights” as codified in 22 USC § 2304(d)(1). The original language also stipulates that any victim must be working “to expose illegal activity car-ried out by government officials” or to “obtain, exercise, defend, or promote internationally recognized human rights and freedoms.” As for sanctions for corruption, it identifies “acts of significant corruption” as sanctionable offenses. This is generally thought to be a stricter standard than the EO’s term “corruption.” It may be worthwhile to aim for this higher standard to make the tightest case possible for sanctions.
As a rule, reach out to other NGOs and individuals working in the human rights and anti-corruption field, especially those who are advocating for their own Global Magnitsky sanctions. Doing so at the beginning of the process will enable you to build strong relationships, develop a robust network, and speak with a stronger voice.
*** And harass they did. Bill Browder is a distant buddy and I watched his communications this morning as he was arrested in Spain. The warrant:
It was about 40 minutes later, he was released. He was in Madrid is to give evidence to senior Spanish anti Russian mafia prosecutor Jose Grinda about the huge amount of money from the Magnitsky case that flowed to Spain. Now that I’m released my mission carries on. Meeting with Prosector Grinda now. This was the SIXTH Russian arrest warrant using Interpol channels. It was NOT an expired warrant, but a live one. Interpol is incapable of stopping Russian abuse of their systems. He is right.
There is not, and never has been, a Red Notice for Bill Browder. Mr Browder is not wanted via INTERPOL channels. https://t.co/8zI3IepOMh
Interpol is a mess for sure. Which is it Interpol? Did you make a call to have Browder released? Un huh…
Then Browder responded: Russia has sent notices to have me arrested through Interpol systems at least THREE times in the last 10 months. It’s a matter of public record that Russia slipped these notices through Interpol controls without them noticing.
***
United States citizens are outraged about the Kremlin’s incursion into the U.S. electoral system, but that is unfortunately just the tip of the iceberg. Russia is also trying to hijack the U.S. judiciary for corrupt purposes, expropriation and political repression, which has received little attention.
Unlawful seizure of private assets and private companies by the Kremlin has been the norm since Vladimir Putin became president in 2000. Russia’s law enforcement agencies and courts are regularly used for the enrichment of the ruling elite.
Annual State Department and Freedom House reports underscore that the Russian judicial system lacks independence from the country’s powerful executive branch.
The Sergei Magnitsky case is the best-known example of the Russian state’s co-opting of the courts to support its kleptocracy. A cabal of Russian tax and law enforcement officers conspired to defraud Russian taxpayers of $230 million, the largest tax fraud in Russian history, by targeting Bill Browder’s company, Hermitage Capital.
When Magnitsky, Browder’s tax attorney, discovered the fraud and notified authorities, Hermitage and Magnitsky were charged with their own fraud. Magnitsky was then arrested and died in pre-trial detention at the age of 37.
Since then, Russian authorities have repeatedly called on Interpol to disseminate red notices to harass Browder and other victims. Interpol, which is meant to facilitate cross-border coordination among law enforcement agencies, is susceptible to abuse as it passes on requests and notices from states without much scrutiny.
Russia misuses Interpol’s red notices to gain the support of international law enforcement agencies, including U.S. law enforcement, in pursuing political dissidents and victims of corporate raiding.
Russian legal authorities also abuse the U.S. court system by exploiting U.S. federal discovery laws. Under these laws, a foreign party can use the U.S. federal courts to compel discovery from any person under U.S. jurisdiction.
The Russian authorities used this law repeatedly against Yukos and its affiliates, after confiscating the oil giant from Mikhail Khodorkovsky and other shareholders.
More recently, agents of the Russian state have engaged in two federal court cases in New York: a 2016 attempt to loot the assets of Janna Bullock and her real estate investment firm RIGroup, and a 2018 effort to plunder the personal property of banker Sergei Leontiev, a former shareholder of Probusinessbank.
The Russian state is using the discovery process to extract information to further criminal charges and extortion schemes against individuals who fled to the U.S. seeking the protection, safety and rule of law now being undermined.
The Russian government and its associates have developed similar strategies to use federal and state courts to recognize and validate bogus decisions from Russian courts, exploit the U.S. Bankruptcy Code on behalf of sham creditors aligned with the Russian state and enforce illegitimate claims and orders issued by corrupt Russian judges.
Although U.S. judges are permitted to consider evidence questioning the legitimacy of a foreign judicial decision, they are rightly hesitant to speculate on whether another country upholds the rule of law.
Such a determination requires significant analysis beyond the scope and ability of most courts and therefore leaves the U.S. judiciary ill-equipped to defend itself against Russian incursion.
The U.S. is slowly beginning to fight back against Russian intrusion into our courts. In 2017, the United States sanctioned two Russian private-sector lawyers, Yulia Mayorova and Andrei Pavlov, who repeatedly represented Russian government agencies in the United States.
After passage by Congress of the “Global Magnitsky Human Rights Accountability Act,” the U.S. sanctioned Artem Chaika, the son of Russia’s prosecutor general, who used his father’s position to extort bribes and win contracts for himself and his cronies, while driving out competition.
More needs to be done to keep Russian lawlessness abroad at bay. The House and Senate judiciary committees should investigate the hacking of U.S. courts and hold hearings to examine the threat they pose, with an eye toward developing legislation that will help block future attacks.
The Department of Justice and the State Department should consider establishing a joint task force to coordinate with U.S. courts, where victims of abuse by corrupt governments could submit their evidence.
The State Department already produces annual reports that opine on the state of foreign judiciaries, which can be put to good use to protect the integrity of U.S. courts.
Cisco’s Talos research unit yesterday reported its discovery of VPNFilter, a modular and stealthy attack that’s assembled a botnet of some five-hundred-thousand devices, mostly routers located in Ukraine. There’s considerable code overlap with the Black Energy malware previously deployed in attacks against Ukrainian targets, and the US Government has attributed the VPNFilter campaign to the Sofacy threat group, a.k.a. Fancy Bear, or Russia’s GRU military intelligence service.
Ukrainian cybersecurity authorities think, and a lot of others agree with them, that Russia was gearing up a major cyberattack to coincide with a soccer League Championship match scheduled this Saturday in Kiev as part of the run-up to the World Cup. They also think it possible an attack could be timed for Ukraine’s Constitution Day, June 28th.
The US FBI has seized a key website used for VPNFilter command-and-control, which US authorities hope will cripple the campaign. The Justice Department says that VPNFilter could be used for “intelligence gathering, theft of valuable information, destructive or disruptive attacks, and the misattribution of such activities.”
***
FBI agents armed with a court order have seized control of a key server in the Kremlin’s global botnet of 500,000 hacked routers, The Daily Beast has learned. The move positions the bureau to build a comprehensive list of victims of the attack, and short-circuits Moscow’s ability to reinfect its targets.
The FBI counter-operation goes after “VPN Filter,” a piece of sophisticated malware linked to the same Russian hacking group, known as Fancy Bear, that breached the Democratic National Committee and the Hillary Clinton campaign during the 2016 election. On Wednesday security researchers at Cisco and Symantec separately provided new details on the malware, which has turned up in 54 countries including the United States.
VPN Filter uses known vulnerabilities to infect home office routers made by Linksys, MikroTik, NETGEAR, and TP-Link. Once in place, the malware reports back to a command-and-control infrastructure that can install purpose-built plug-ins, according to the researchers. One plug-in lets the hackers eavesdrop on the victim’s Internet traffic to steal website credentials; another targets a protocol used in industrial control networks, such as those in the electric grid. A third lets the attacker cripple any or all of the infected devices at will.
The FBI has been investigating the botnet since at least August, according to court records, when agents in Pittsburgh interviewed a local resident whose home router had been infected with the Russian malware. “She voluntarily relinquished her router to the agents,” wrote FBI agent Michael McKeown, in an affidavit filed in federal court. “In addition, the victim allowed the FBI to utilize a network tap on her home network that allowed the FBI to observe the network traffic leaving the home router.”
The FBI is working to disrupt a massive, sophisticated Russia-linked hacking campaign that officials and security researchers say has infected hundreds of thousands of network devices across the globe.
The Justice Department late Wednesday announced an effort to disrupt a botnet known as “VPNFilter” that compromised an estimated 500,000 home and office (SOHO) routers and other network devices. Officials explicitly linked the botnet to the cyber espionage group known as APT 28, or Sofacy, believed to be connected to the Russian government.
Officials said that the U.S. attorney’s office for the western district of Pennsylvania has obtained court orders allowing the FBI to seize a domain that is part of the malware’s command-and-control infrastructure. This will allow officials to redirect attempts by the malware to reinfect devices to an FBI-controlled server, thereby protecting devices from being infected again after rebooting.
Assistant Attorney General for National Security John C. Demers in a statement described the effort as the “first step in the disruption of a botnet that provides the Sofacy actors with an array of capabilities that could be used for a variety of malicious purposes, including intelligence gathering, theft of valuable information, destructive or disruptive attacks, and the misattribution of such activities.”
Cybersecurity researchers first began warning of the destructive, sophisticated malware threat on Wednesday. Cisco’s Talos threat intelligence group said in a blog post Wednesday that VPNFilter had infected at least 500,000 devices in 54 or more countries.
The researchers had been tracking the hacking threat for several months and were not ready to publish their findings, but when the malware began infecting devices in Ukraine at an “alarming rate,” they decided to publish their research early.
“Both the scale and the capability of this operation are concerning. Working with our partners, we estimate the number of infected devices to be at least 500,000 in at least 54 countries,” the researchers wrote.
The malware targets home and office routers and what are known as network-access storage (NAS) devices, hardware devices that store data in one, single location but can be accessed by multiple individuals — creating a massive system of infected devices, commonly known as a botnet.
VPNFilter also uses two stages of malware, an unusual set up that makes it more difficult to prevent a device from being re-infected after it is rebooted. The FBI on Wednesday urged individuals whose devices may have been infected to reboot them as soon as possible.
The FBI is also also soliciting help from a nonprofit known as the Shadowserver Foundation, which will pass the IP addresses to internet service providers, foreign computer emergency teams and others to help stem the damage.
The malware is the latest sign of the growing cyber threat from Russia. News of the outbreak comes roughly a month after senior U.S. and British officials blamed the Russian government for coordinated cyberattacks on network devices in an effort to conduct espionage and intellectual property theft.
The U.S. has also blamed Moscow for the global cyberattack known as notPetya that ravaged computers across the globe last summer, calling it the most destructive and costly cyberattack in history.
The code of VPNFilter has similarities with version of another malware known as BlackEnergy, which was used in an attack on Ukraine’s power grid in late 2015. The Department of Homeland Security has linked the malware to the Russian government.
Congress knows it needs to amend the CFIUS law, yet no one has proposed any legislation. Complying with CFIUS is optional. All this while China is the largest applicant in the United States for patents and is buying up land in Washington State with nefarious intentions under the guise of farm land operations.
Meawhile –>
Politico: The U.S. government was well aware of China’s aggressive strategy of leveraging private investors to buy up the latest American technology when, early last year, a company called Avatar Integrated Systems showed up at a bankruptcy court in Delaware hoping to buy the California chip-designer ATop Tech.
ATop’s product was potentially groundbreaking — an automated designer capable of making microchips that could power anything from smartphones to high-tech weapons systems. It’s the type of product that a U.S. government report had recently cited as “critical to defense systems and U.S. military strength.” And the source of the money behind the buyer, Avatar, was an eye-opener: Its board chairman and sole officer was a Chinese steel magnate whose Hong Kong-based company was a major shareholder.
Despite those factors, the transaction went through without an assessment by the U.S. government committee that is charged with reviewing acquisitions of sensitive technology by foreign interests.
In fact, a six-month POLITICO investigation found that the Committee on Foreign Investment in the United States, the main vehicle for protecting American technology from foreign governments, rarely polices the various new avenues Chinese nationals use to secure access to American technology, such as bankruptcy courts or the foreign venture capital firms that bankroll U.S. tech startups.
The committee, known by its acronym CFIUS, isn’t required to review any deals, relying instead on outsiders or other government agencies to raise questions about the appropriateness of a proposed merger, acquisition or investment. And even if it had a more formal mandate, the committee lacks the resources to deal with increasingly complex cases, which revolve around lines of code and reams of personal data more than physical infrastructure.
“I knew what was critical in 1958 — tanks, airplanes, avionics. Now, truthfully, everything is information. The world is about information, not about things,” said Paul Rosenzweig, who worked with CFIUS while at the Department of Homeland Security during President George W. Bush’s second term. “And that means everything is critical infrastructure. That, in some sense, means CFIUS really should be managing all global trade.”
As a senior official at the Treasury Department, which oversees CFIUS, put it: “Any time we see a company that has lots of data on Americans — health care, personal financial data — that’s a vulnerability.”
When CFIUS was formed, in the 1970s, the companies safeguarding important technology were so large that any takeover attempt by foreigners would be certain to attract attention. Now, much of the cutting-edge technology in the United States is in the hands of much smaller firms, including Silicon Valley startups that are hungry for cash from investors.
The gap in oversight became a more urgent problem in 2015, when China unveiled its “Made in China 2025” strategy of working with private investors to buy overseas tech firms. A year earlier, Chinese investments in U.S. tech startups had totaled $2.3 billion, according to the economic research firm CB Insights. Such investments immediately skyrocketed to $9.9 billion in 2015. These amounts dipped the following year, as the Obama administration voided a high-profile deal, but analysts say China’s appetite to buy U.S. firms and technology is still strong. In 2017, there were 165 Chinese-backed deals closed with American startups, only 12 percent less than the 2015 peak.
Yet the failure to investigate some forms of Chinese investments in American technology has flown under the radar as President Donald Trump goes tit for tat with Beijing, imposing tariffs meant to punish China for unfair trade practices. Critics noted on Monday that Trump’s tentative agreement to drop his tariff threat in exchange for Chinese pledges to purchase billions of dollars more in American goods avoided any mention of the outdated foreign-investment policies that have alarmed lawmakers across the political spectrum.
On the Senate floor Monday, Minority Leader Chuck Schumer (D-N.Y.) lashed out at Trump’s approach.
“China’s trade negotiators must be laughing themselves all the way back to Beijing,” he said. “They’re playing us for fools — temporary purchase of some goods, while China continues to steal our family jewels, the things that have made America great: the intellectual property, the know-how in the highest end industries. It makes no sense.”
National security specialists insist that such a stealth transfer of technology through China’s investment practices in the United States is a far more serious problem than the tariff dispute — and a problem hiding in plain sight. A recent Pentagon report bluntly declared: “The U.S. does not have a comprehensive policy or the tools to address this massive technology transfer to China.” It went on to warn that Beijing’s acquisition of top-notch American technology is enabling a “strategic competitor to access the crown jewels of U.S. innovation.”
Some congressional leaders concur. Senate Majority Whip John Cornyn (R-Texas) regularly warns his colleagues that China is using private-sector investments to pilfer American technology. China has “weaponized” its investments in America “in order to vacuum up U.S. industrial capabilities from American companies,” Cornyn said at a January hearing. The goal, he added, is “to turn our own technology and know-how against us in an effort to erase our national security advantage.”
Legislation to expand the CFIUS budget and staff has been moving slowly through the halls of Congress amid pushback from Silicon Valley entrepreneurs and business groups. The legislation would give CFIUS new resources to scrutinize bankruptcy purchases and establish stricter scrutiny of start-up investments.
As months passed without any action, and the issue of Chinese investments got overshadowed by tariff fights and feuds between Beijing and the Trump administration, national security experts grew more concerned, fearing that Congress lacked a sense of urgency to police transfers of sensitive technology.
The White House began exploring what more it could do on its own, asking the Treasury Department in late March to offer a list of potential Chinese investment restrictions within 60 days.
Finally, earlier this month, Senate and House leaders announced plans to mark up the bill, starting a process that could lead to passage later this year.
Still, the failure to act more quickly may itself be jeopardizing national security. At a hearing in January, Heath Tarbert, the Treasury Department assistant secretary overseeing CFIUS, testified that allowing foreign countries to invest in U.S. technology without making sufficient background checks “will have a real cost in American lives in any conflict.”
“That is simply unacceptable,” he said.
‘Made in China 2025’
Last October, Chinese President Xi Jinping took the podium before 2,300 Communist Party delegates to deliver his expansive vision for China’s future.
Xi was speaking at the party’s 19th Congress, a summit held every five years to choose the nation’s leaders in the Great Hall of the People in Beijing, the expansive theater right off Tiananmen Square. Speaking in front of a giant gold hammer and sickle framed by bright red drapes, Xi held forth for 3½ hours, declaring that China would look outward to solve its problems.
“China will not close its door to the world — we will only become more and more open,” Xi declared to his rapt audience of party leaders, many of them having close ties to the billionaire investors who represent China in the global market. “We will deepen reform of the investment and financing systems, and enable investment to play a crucial role in improving the supply structure.”
China watchers said Xi was alluding to the government’s relatively new economic plan, dubbed “Made in China 2025,” which leaders had unveiled in 2015. The detailed vision shifted the focus on domestic research investments to the need to pump money into — and better understand — foreign markets.
“We will,” the document proclaimed, “guide enterprises to integrate into local culture.”
“We will,” the document continued, “support enterprises to perform mergers, equity investment and venture capital investment overseas.”
At the top of the investment wish list were high-tech industries like artificial intelligence, robotics and space travel.
For the increasingly powerful Chinese leader, it was the culmination of years of efforts to guide how China spends its blossoming wealth. In addition to luring foreign companies to China, Xi wanted the country — which is sitting on several trillion dollars in foreign exchange reserves — to start investing abroad.
The plan had “much more money behind it” and “much more coordination” between Beijing and Chinese industrialists than previous economic strategies, according to Scott Kennedy, an expert on Chinese economic policy at the Center for Strategic and International Studies, a Washington think tank that specializes in defense matters.
“And a big component of that is acquiring technology abroad,” he said.
From 2015 to 2017, Chinese venture capitalists pumped money into hot companies like Uber and Airbnb, but also dozens of burgeoning firms with little or no name recognition. The country didn’t just want “trophy assets,” Kennedy explained. China’s leaders wanted to “fill in some of the gaps they have” in China’s tech economy.
While the Asian power has piled up profits from its large manufacturing plants that churn out low-cost products, the Beijing government realized it would face declining productivity unless its economy, from agriculture to manufacturing, adopted high-tech methods. Essentially, China wanted to automate entire industries — including car manufacturing, food production and electronics — and bring the whole process in-house.
So Beijing’s leaders encouraged the country’s cash-rich investors to search for “emerging companies that have technologies that may be extremely important … but aren’t proven,” Kennedy said. The initiative has spawned investments in American startups that work on robotics, energy equipment and next-generation IT. Of particular concern to U.S. national security officials is the semiconductor industry, which makes the microchips that provide the “guts” of many advance technologies that China is seeking to leverage.
“A concerted push by China to reshape the market in its favor, using industrial policies backed by over one hundred billion dollars in government-directed funds, threatens the competitiveness of U.S. industry and the national and global benefits it brings,” declared a January 2017 report from the President’s Council of Advisors on Science and Technology, warning of the urgent threat to U.S. superiority in semiconductor technology.
Notably, many of China’s investments didn’t register on the CFIUS radar. They involved the early-seed funding of tech firms in Silicon Valley and low-profile purchases such as the one in Delaware bankruptcy court. They included joint ventures with microchip manufacturers, and the research and development centers created with international partners.
“They have diversified to look for smaller targets,” Kennedy said. “Those things typically do not generate a CFIUS reaction. That is part of it.”
An obscure research body
CFIUS was set up by Congress in 1975 amid growing concerns about oil-rich countries in the Middle East buying up American companies, from energy firms to armsmakers. Chaired by the Treasury Department, the committee brought together representatives from all the major Cabinet agencies to assess the financial, technological and national security threats posed by such investments. For its first decade, however, CFIUS existed mostly as an obscure research body. From 1975 to 1980, the committee met only 10 times, according to congressional reports.
Japan’s economic ascendance in the 1980s changed that. The Defense Department asked CFIUS to step in and investigate potential Japanese purchases of a U.S. steel producer and a company that made ball bearings for the military. In 1988, Congress gave the committee the authority to recommend that the president nix a deal altogether. Still, the committee remained mostly an ad hoc operation into the 1990s.
“Bureaucratically it was not a very smooth, functioning operation,” recalled Steve Grundman, who worked as part of the committee during the Clinton administration. “We had to pick up some intelligence here, some technology assessment there, some industrial analysis hither.”
After the Sept. 11, 2001, terrorist attacks, Congress renewed its interest in CFIUS, passing legislation that instructed the committee to consider a deal’s effect on “homeland security” and “critical industries,” a notable change, according to Rosenzweig, the DHS official who worked with CFIUS during the George W. Bush administration. The directive gave the committee a mandate to keep an eye on a wider array of industries, such as hospitals and banks, that DHS considered “critical” to keeping American society operating.
Rosenzweig called it a “singular shift.” Over time, he said, the committee went from reviewing acquisitions of steel companies — involving just two parties and a tangible product — to investigating technically complex purchases of microchip companies and other software or data-rich firms.
“When I first came to CFIUS, the filings from the other side would be a few-page letter about why this was a good deal,” Rosenzweig said. “Now it’s a stack of books that’s up to my knee.”
The committee’s staffing and resources have not kept pace with the growing workload, multiple people who work with CFIUS told POLITICO. While the Treasury Department has been hiring staffers and contractors to help handle the record workload, the committee’s overall resources are subject to the whims of the individual agencies involved in the process, said Stephen Heifetz, who oversaw the CFIUS work at DHS during the second Bush administration.
There is no single budget or staffing figure for CFIUS. Instead, each agency decides the level of personnel and funding it’s willing to commit to the committee. The Treasury Department and DHS have two of the larger CFIUS teams, Heifetz said. During his tenure, Heifetz’s DHS squad included roughly 10 people, split equally between government workers and outside contractors.
“Each agency decides more or less on their own how they’re going to staff it,” Heifetz said.
At Treasury, there are now between 20 and 30 people working for CFIUS, according to a senior department official. But even with the expanded team, the committee is stretched precariously thin. The official described 80-hour workweeks, regular weekend work and no ability to take time off.
“It’s enough to handle the current mandate, but not comfortably,” the official said.
Amid this uncertainty over resources, CFIUS investigations into foreign acquisitions nearly tripled from 2009 to 2015. The most common foreign investor that hits the CFIUS radar is now China. Nearly 20 percent of the committee’s reviews from 2013 to 2015, the most recent data available, involved the Asian power, easily ahead of second-place Canada at just under 13 percent.
Since 2015, the Treasury official said, those trends have only continued: Chinese deals now represent a large plurality of the committee’s work.
The attention appears to be well-founded. In recent years, China has been repeatedly accused of industrial espionage — using indirect means to obtain American software and military secrets, everything from the code that powers wind turbines to the designs that produce the Pentagon’s modern F-35 fighter jets. And several Chinese businessmen have pleaded guilty to participating in complex conspiracies to get their hands on sensitive technical data from U.S. firms and shuttle it back to Beijing. Again and again, high-tech products and military equipment have popped up in China that bear a too-striking resemblance to their American counterparts.
Spurred by these incidents, CFIUS has successfully advised the president to nix Chinese deals at a record clip. In December 2016, President Barack Obama stopped a Chinese investment fund from acquiring the U.S. subsidiary of a German semiconductor manufacturer — only the third time a president had taken such a step at that point. In September 2017, Trump halted a China-backed investor from buying the American semiconductor maker Lattice, citing national security concerns.
Three months later, a Chinese company’s plan to acquire the American money transfer company MoneyGram fell apart when the two sides realized they would likely not get CFIUS approval because of concerns that the personal data of millions of Americans — including military personnel — could fall into the hands of the Chinese military.
Weeks after that, the committee essentially jettisoned a Chinese state-backed group’s attempt to buy Xcerra, a Massachusetts-based tech company that makes equipment to test computer chips and circuit boards. Then, in March, Trump blocked the purchase of the chipmaker Qualcomm by Singapore-based Broadcom Ltd. CFIUS said such a move could weaken Qualcomm, and thereby the United States, as it vies with foreign rivals such as China’s Huawei Technologies to develop the next generation of wireless technology known as 5G.
To national security leaders, though, CFIUS is still only scratching the surface of China’s ambitions to acquire U.S. technology, noting that traditional sale-and-purchase agreements to obtain a U.S. company aren’t the only ways to gain access to cutting-edge technology.
“You can buy a [partial] interest in a company and gain access to the same type of technology,” Attorney General Jeff Sessions told Congress in October, adding that Justice Department investigators “are really worried about our loss of technology” in instances where Chinese investors buy small stakes in American tech companies.
The U.S. military has raised similar concerns. Defense Secretary Jim Mattis warned last summer that America is failing to restrict foreign investments in certain types of critical industries, testifying during another hearing that CFIUS is “outdated” and “needs to be updated to deal with today’s situation.”
A mysterious takeover
The case that occurred last summer in an obscure courtroom in Delaware seemed innocuous enough: one relatively small tech firm buying out a bankrupt competitor, a transaction that elicited about as much drama as mailing a letter.
The bankrupt semiconductor maker ATop Tech had only 86 employees when it was declared insolvent. But it had a more than a $1 billion market share of the electronic-design automation and integrated circuits markets, the company told the bankruptcy court, giving it potential value to any player seeking to enter the highly specialized semiconductor industry.
Avatar Integrated Systems, the company seeking to purchase ATop, was apparently such a player. But it was not well known to others in the semiconductor industry, and its precise ownership was a bit of a mystery. The sole director listed on its incorporation papers was a Hong Kong-based businessman named Jingyuan Han, and it issued shares to King Mark International Limited, a Hong Kong company in which Han was an investor. Avatar was set up in March 2017, according to the company.
The transaction went ahead despite concerns raised to the court by other players in the semiconductor industry, as well as those of a former senior Pentagon official who specifically suggested the Chinese government may be backing Avatar.
The former Pentagon official, Joseph Benkert, was enlisted by another American semiconductor company, Synopsys, to help recoup money it was owed by ATop. He warned the court that the deal might have national security risks.
“CFIUS has identified businesses engaged in design and production of semiconductors as presenting possible national security vulnerabilities because they may be useful in defending, or seeking to impair, U.S. national security, as semiconductor design or production may have both commercial or military applications,” Benkert, the former assistant secretary of defense for global affairs under the second Bush administration, wrote to the court.
Benkert argued that the question of Avatar’s ownership needed more review given that the company appeared to be “under the control of Han, a Chinese national.”
“In my opinion,” Benkert wrote, “the proposed transaction is likely to receive thorough CFIUS scrutiny and there is a material risk that it will not receive CFIUS approval.”
But despite those concerns, the deal to buy ATop Tech was not given a formal review by CFIUS, according to a senior administration official with direct knowledge of the process. A Treasury Department official, speaking on behalf of CFIUS, declined to comment on the merger.
An Avatar official, reached at the company office in Santa Clara, California, did not respond to questions or a request for an interview with Han. The company did not respond to multiple requests to discuss its relationship — if any — with the Chinese government or the details of its business.
Han, who has been described in media reports as one of China’s wealthiest men, has spent his career almost entirely in the iron and steel industries. Avatar’s scant history seemed to suggest that it was created for the sole purpose of acquiring an established American semiconductor firm like ATop Tech, according to several former national security officials who still work on CFIUS cases.
Attempts to reach Han through China Oriental Group, the iron and steel company that he runs, were also unsuccessful.
Officials familiar with the CFIUS process say that bankruptcy deals such as the Atop-Avatar case sometimes fall off their radar because of difficulty in discerning whether Chinese investors are working with the government. In other bankruptcy cases, Chinese investment in a potential buyer may not be visible in official filings, especially when a web of holding companies is involved. Thus, say current and former officials working with CFIUS, a significant amount of detective work is necessary to discern both the identity and the intentions of the investors.
Traditionally, courts have defined control of a company as “the ability to direct management to make certain decisions.” But a former Treasury Department official said CFIUS needs to focus on “beneficial ownership,” defined as having the ability to obtain technology from the firm, rather than overall decision-making power.
“It is very hard to find beneficial ownership,” said the official. “Our concern is the capacity of the system to deal with these.”
The bills pending in Congress to strengthen the CFIUS review process include provisions designed to make scrutiny of bankruptcy cases easier. The bills would require CFIUS to “prescribe regulations to clarify that the term ‘covered transaction’ includes any transaction … that arises pursuant to a bankruptcy proceeding or other form of default on debt.”
A sharper focus on bankruptcy cases, particularly in making sure CFIUS scrutinizes investors to ties to foreign governments, is desperately needed, said a former Pentagon official who is still involved in CFIUS cases. “How do they find out about it now? They are reading The Wall Street Journal late at night,” the official said. “It is not a very systematic process.”
The former official also recalled that in the past, the Pentagon has hired an outside contractor to scour around for unreported transactions that might raise some national security flags, such as in the semiconductor or aerospace sectors. Such checks need to be performed in a more systematic way.
“There is no process for surfacing information out of the bankruptcy courts,” the official said.
China goes to Silicon Valley
In Silicon Valley, Chinese investment isn’t typically viewed as a threat, but rather more of a blessing.
Chris Nicholson, co-founder of Skymind, an artificial intelligence company that makes the type of cutting-edge software that both the United States and China covet, recalls the many long months he spent in 2014 trudging up and down Sand Hill Road, the heart of Silicon Valley’s leading venture capital firms, and all the doors that slammed shut.
“That was a long, dry year for us,” he told POLITICO.
Nicholson hadn’t sought Chinese money. But then Tencent, China’s internet and telecommunications giant and now one of the world’s largest companies, approached the firm, offering $200,000 in seed funding. The Chinese monetary infusion buoyed Skymind, which soon landed a coveted spot in Y Combinator, the powerful startup accelerator. American investors, who had only months earlier eschewed the firm’s overtures, quickly changed their tune. Chinese investment soon beget American investment.
“It was that crucial piece of Chinese capital that allowed us to survive,” Nicholson said. “That’s all it took. Now we’re a company with 35 employees.”
Reflecting a common feeling among his cohorts in Silicon Valley startups, Nicholson insisted that working with Chinese investors does not mean granting Beijing officials access to the coding process. “My American co-founder and I are in control,” Nicholson said, noting that Skymind has given up none of the rights to its intellectual property and has made its code “open sourced,” which means the code is freely available for cybersecurity experts to inspect, audit and offer suggestions.
But Bryan Ware, CEO of Haystax Technology, which works with law enforcement, defense and intelligence clients on securing their technologies, cast some doubt on the idea that the owners of tech startups would naturally refuse to share details of their technology with their investors: “If you’ve got a Chinese investor and that’s the lifeblood that’s going to allow you to get your product out the door, or allow you to hire your next developer, telling them, ‘No, you can’t do that,’ or, ‘No you shouldn’t do that,’ while you have no other alternatives for financing — that’s just the nature of the dilemma.”
“Every investment comes with a risk of some loss of intellectual property or foreign influence and control,” Ware said.
And too many Silicon Valley deals exist in a “netherworld” between passive investment and absolute takeover, “where there’s access to information, technical information, [and] there is the ability to influence and potentially coerce management,” according to the senior Treasury Department official.
One major concern among specialists like Ware is that Beijing officials could use early Chinese investments in next-generation technology to map the software the federal government and even the Defense Department may one day use — and perhaps even corrupt it in ways that would give China a window into sensitive U.S. information.
A POLITICO review of 185 tech startups with Chinese investors found just over 5 percent had received government contracts, loans or grants ranging from a few thousand dollars to several million dollars. Often, the contracts simply involved research — renewable energy for the Energy Department, electronics and communications equipment for the Pentagon, space technology for NASA. Others ordered lab equipment for the Commerce Department, or machine tools for the military.
“There’s a tremendous amount of intelligence value there,” Ware said. “All governments desire to know what other governments are doing. And knowing the technologies and how they work I think is a big part of that.”
While there’s no indication that the firms had U.S. government contracts at the time that Chinese investors became involved, that may be part of China’s strategy. Derek Scissors, who manages the American Enterprise Institute’s China Global Investment Tracker, an exhaustive database of China’s major global investments, said that as welcome as the surge of Chinese-funded deals may be in Silicon Valley, the engine behind them is the Chinese government. China’s Silicon Valley investment strategy “was shaped by the state and that shaping has gotten tighter,” he said.
Still, many Chinese investments in the United States are not directly backed by the Beijing government, but it can be hard to distinguish.
Some prominent Chinese VC firms in Silicon Valley have clear links to the government. Westlake Ventures, for example, received funding from the government in the coastal Chinese city of Hangzhou, according to media reports and a Pentagon research paper. And Westlake has put money into other VC funds, such as the WI Harper Group, which has a stake in a wide slate of American tech companies, from a dating app to a three-dimensional imaging company to a maker of robot cooks. Westlake did not respond to a request for comment.
But it’s not always easy to trace the money back to a single source, let alone determine what connection that source has to Beijing’s Communist leadership. Haiyin Capital, a Beijing-based VC firm, is partially backed by a state-run Chinese company, according to a company release. Also complex is ZGC Capital Corporation — located in Silicon Valley and focused on providing startups with basic business help — is a subsidiary of a state-owned enterprise funded by the Beijing government, according to the organizations’ websites. Attempts to reach each organization were unsuccessful.
Security and economics experts say they are unsure how much financial or national security harm these Chinese investments are actually causing the United States — if any — simply because it may not be clear for years exactly how important the technology may be.
In the meantime, entrepreneurs in Silicon Valley are blunt: America actually needs Chinese money to maintain its global tech advantage.
“Here’s my warning shot,” Nicholson said. “If we make it difficult for foreign talent and foreign capital to find each other by over-regulating early-stage startup investing … we will lose our supremacy as the top tech economy in the world.”
Enter Congress
In Washington, Silicon Valley’s warning has been heard loudly enough to delay the passage of a bill to strengthen the CFIUS process, despite the support of such bipartisan figures as Cornyn, the second-ranking Senate Republican, and California’s own Democratic Sen. Dianne Feinstein, the ranking member of the Senate Judiciary Committee.
Last year, after a cascade of warnings from the Defense Department, Justice Department and other powerful sources, both the House and Senate seemed ready to take action to strengthen oversight of foreign investment in technology companies.
The bipartisan proposal would direct CFIUS to consider whether pending investments would erode America’s technological edge, enable a foreign government to utilize digital spying powers that might be used against the United States, or give sensitive data — even indirectly — to a foreign government. Similarly, it would expand the definition of “critical industries” — a reference to sectors like banking, defense or energy — to include “critical technologies,” a significant expansion of the committee’s current mandate.
Under the bill, CFIUS would have to create a system to monitor transactions that aren’t voluntarily brought to the committee’s attention.
The measure would also centralize some of the committee’s functions and allow the committee to charge filing fees up to 1 percent of the total value of the transaction up to $300,000, and let Treasury offer a single CFIUS budget request rather than relying on contributions from other departments.
The Trump administration offered a full-throated endorsement of the bill in January, saying it “would strengthen our ability to protect national security and enhance confidence in our longstanding open investment policy.”
And while the bill doesn’t explicitly cite China, the provisions are clearly aimed at limiting its access to the most sensitive areas.
“Any Chinese-related company that is part of our supply chain is a concern to me,” Rep. Robert Pittenger (R-N.C.), a lead House sponsor of the bill, told POLITICO.
Pittenger insisted that Congress’ inaction is allowing China to brazenly pilfer the technology that drives America’s military might, and sell that technology to adversaries like Iran and North Korea. He noted that a Treasury official told him getting the bill signed is the department’s No. 1 legislative priority for 2018.
“We can’t turn a blind eye to this,” Pittenger said.
But many technology entrepreneurs believe the bill would simply drive cutting-edge research overseas. In 2016, foreign investors injected $373 billion into the United States, a figure that has been mostly increasing since the early 2000s, according to government data. Lengthening the CFIUS review time — currently 30 days, but set to extend to 45 days under the new bill — could damage the “brittle process” of early-stage fundraising, said Nicholson, who encouraged lawmakers to focus on expanding CFIUS powers in other areas, such as bankruptcy courts.
“I worry that they’re driving a bulldozer towards a rose garden,” said Nicholson, echoing his claim that training the CFIUS lens on Silicon Valley could scare off the very financing that keeps America growing.
IBM’s vice president for regulatory affairs, Christopher Padilla, agreed, warning at a January hearing that the bill “could constitute the most economically harmful imposition of unilateral trade restrictions by the United States in many decades.”
He raised particular concerns about expanding CFIUS authority to cover foreign investments in “critical technologies,” a phrase tech leaders say is worryingly opaque and that could force companies peddling sensitive technology to have every single sale reviewed.
Padilla called it a “we’ll know it when we see it” approach to regulating that “would be deeply damaging to U.S. competitiveness, and, more important, could lead to a false sense of security.”
Some industry groups have suggested that the bill should delineate these technologies — robotics or artificial intelligence, for instance — to avoid having every deal scrutinized from top to bottom.
“We would be well served to define those issues from the outset,” said Dean Garfield, CEO of the Information Technology Industry Council, a trade group representing industry heavyweights such as Amazon, Apple, Facebook, Google, Microsoft and Twitter. Garfield said getting the bill revised is a top-five issue for ITI in 2018.
He cautioned that the bill, as written, could spike the number of annual CFIUS reviews from “a few hundred deals” to “a few thousand.”
Proponents, however, feel that specifying specific technologies might be impossible. The software powering the country — from waterways to missile systems — is constantly changing and evolving, they say. Instead, they suggest, new CFIUS funds and a streamlined reporting process would help keep the growing stream of deal reviews moving.
“For the price of a single B-21 bomber, we can fund an updated CFIUS process and protect our key capabilities for several years,” Cornyn said at a hearing. “That is a down payment on long-term national security.”
Nonetheless, lawmakers have been working to address industry complaints, making tweaks to the legislation. And just last week, lawmakers made a breakthrough, agreeing to slightly narrow the bill’s scope, raising the chances the measure will make it to the president’s desk.
The House and Senate are scheduled to mark up their respective CFIUS bills on Tuesday, and lawmakers now are angling to attach the legislation to the annual, must-pass defense authorization bill as a way to guarantee it gets through. But lingering disputes could still derail the process.
National security leaders and lawmakers warn that these squabbles, while reflecting sincerely held positions, are simply delaying necessary action. At that January hearing, Cornyn described a changing reality if CFIUS is left in its current iteration.
“Just imagine if China’s military was stronger, faster and more lethal,” Cornyn said.
“That is what the future likely holds,” he added, “unless we act.”