Next Mission is Citizenship Cheaters, Finally

The USCIS is authorized to cancel any Certificate of Citizenship or Naturalization in cases where evidence provided to government documents is proven false.

Just 5 days ago: U.S. Citizenship and Immigration Services (USCIS) assisted in an investigation that led to U.S. District Judge Virginia M. Hernandez Covington sentencing Enite Alindor, also known as Odette Dureland, to five months in federal prison. The 55-year-old woman was sentenced for making false statements in a matter relating to naturalization and citizenship and for procuring naturalization as a U.S. citizen. As part of her sentence, the court also entered an order de-naturalizing her, thus revoking her July 2012 naturalization as a U.S. citizen. A federal jury had found her guilty on March 1, 2018.

According to court documents, Alindor, a citizen of Haiti, applied for asylum with the Immigration and Naturalization Service (INS) in Miami in 1997. After the INS denied that application, the United States Immigration Court ordered her to be removed from the United States. Shortly thereafter, Alindor presented herself to the INS as Odettte Dureland and filed for asylum protection under that new identity. She concealed the fact that she had previously applied for status in the United States as Enite Alindor, and she concealed the fact that she was under a final order for removal from the United States. USCIS personnel, unaware of the Alindor identity and order of removal, approved Dureland for citizenship in July 2012, and she was naturalized as a U.S. citizen under that name in July 2012.

When Prosecutors Cheat Justice to Protect Aliens ... photo

How about this one from January?

Iyman Faris is set to be released from prison in 2020 after serving 17 years behind bars for terrorism-related charges stemming from a plot to destroy the Brooklyn Bridge. By the time he gets out, American authorities hope, he will no longer be able to call the U.S. his home.

The Justice Department has filed a lawsuit to try to strip the Pakistan-born Faris of his citizenship, which he obtained in 1999, saying it’s an affront to allow him to continue to be an American citizen.

It’s just the type of case authorities say they expect to pursue more frequently under President Trump and Attorney General Jeff Sessions.

“The attorney general and the administration are focused on enforcing all immigration laws, especially when it comes to this pinnacle level of citizenship,” said one Justice Department official, who spoke on the condition of anonymity.

AG Sessions is holding true to his mission on immigration.

(AP) — The U.S. government agency that oversees immigration applications is launching an office that will focus on identifying Americans who are suspected of cheating to get their citizenship and seek to strip them of it.

U.S. Citizenship and Immigration Services Director L. Francis Cissna told The Associated Press in an interview that his agency is hiring several dozen lawyers and immigration officers to review cases of immigrants who were ordered deported and are suspected of using fake identities to later get green cards and citizenship through naturalization.

Cissna said the cases would be referred to the Department of Justice, whose attorneys could then seek to remove the immigrants’ citizenship in civil court proceedings. In some cases, government attorneys could bring criminal charges related to fraud.

Until now, the agency has pursued cases as they arose but not through a coordinated effort, Cissna said. He said he hopes the agency’s new office in Los Angeles will be running by next year but added that investigating and referring cases for prosecution will likely take longer.

“We finally have a process in place to get to the bottom of all these bad cases and start denaturalizing people who should not have been naturalized in the first place,” Cissna said. “What we’re looking at, when you boil it all down, is potentially a few thousand cases.”

He declined to say how much the effort would cost but said it would be covered by the agency’s existing budget, which is funded by immigration application fees.

The push comes as the Trump administration has been cracking down on illegal immigration and taking steps to reduce legal immigration to the U.S.

Immigrants who become U.S. citizens can vote, serve on juries and obtain security clearance. Denaturalization — the process of removing that citizenship — is very rare.

The U.S. government began looking at potentially fraudulent naturalization cases a decade ago when a border officer detected about 200 people had used different identities to get green cards and citizenship after they were previously issued deportation orders.

In September 2016, an internal watchdog reported that 315,000 old fingerprint records for immigrants who had been deported or had criminal convictions had not been uploaded to a Department of Homeland Security database that is used to check immigrants’ identities. The same report found more than 800 immigrants had been ordered deported under one identity but became U.S. citizens under another.

Since then, the government has been uploading these older fingerprint records dating back to the 1990s and investigators have been evaluating cases for denaturalization.

Earlier this year, a judge revoked the citizenship of an Indian-born New Jersey man named Baljinder Singh after federal authorities accused him of using an alias to avoid deportation.

Authorities said Singh used a different name when he arrived in the United States in 1991. He was ordered deported the next year and a month later applied for asylum using the name Baljinder Singh before marrying an American, getting a green card and naturalizing.

Authorities said Singh did not mention his earlier deportation order when he applied for citizenship.

For many years, most U.S. efforts to strip immigrants of their citizenship focused largely on suspected war criminals who lied on their immigration paperwork, most notably former Nazis.

Toward the end of the Obama administration, officials began reviewing cases stemming from the fingerprints probe but prioritized those of naturalized citizens who had obtained security clearances, for example, to work at the Transportation Security Administration, said Muzaffar Chishti, director of the Migration Policy Institute’s office at New York University law school.

The Trump administration has made these investigations a bigger priority, he said. He said he expects cases will focus on deliberate fraud but some naturalized Americans may feel uneasy with the change.

“It is clearly true that we have entered a new chapter when a much larger number of people could feel vulnerable that their naturalization could be reopened,” Chishti said.

Since 1990, the Department of Justice has filed 305 civil denaturalization cases, according to statistics obtained by an immigration attorney in Kansas who has defended immigrants in these cases.

The attorney, Matthew Hoppock, agrees that deportees who lied to get citizenship should face consequences but worries other immigrants who might have made mistakes on their paperwork could get targeted and might not have the money to fight back in court.

Cissna said there are valid reasons why immigrants might be listed under multiple names, noting many Latin American immigrants have more than one surname. He said the U.S. government is not interested in that kind of minor discrepancy but wants to target people who deliberately changed their identities to dupe officials into granting immigration benefits.

“The people who are going to be targeted by this — they know full well who they are because they were ordered removed under a different identity and they intentionally lied about it when they applied for citizenship later on,” Cissna said. “It may be some time before we get to their case, but we’ll get to them.”

Is a Chinese Hack on our Naval Weapons an Act of War?

It is long been a question of the point that a foreign hack for espionage and theft is an act of war with emphasis on our naval weapons programs or those of the Army or Air Force.

Cyber warfare is an issue few care about or have control over because data resides outside of our individual control but that is NOT the case when it comes to government. They are accountable for safeguarding networks and data.

After a hiatus of several years, Chinese state hackers are once again penetrating networks at a range of U.S. corporations in a campaign to steal secrets and leapfrog ahead in a race for global technology supremacy, cyber researchers say.

Companies in fields such as biomedicine, robotics, cloud computing and artificial intelligence have all been hit by cyber intrusions originating in China, the researchers say.

“It’s definitely accelerating. The trend is up,” said Dmitri Alperovitch, cofounder and chief technology officer at CrowdStrike, a threat intelligence firm based in Sunnyvale, Calif.,

Chinese state hacking teams linked to the People’s Liberation Army and the Ministry of State Security are becoming visible on U.S. networks again, although they are using new methods to remain undetected, researchers said.

“In the last few months, we’ve definitely seen … a reemergence of groups that had appeared to have gone dormant for a while,” said Cristiana Brafman Kittner, principal analyst at FireEye, a cybersecurity firm that has tracked China hacking extensively.

The activity comes after a sharp drop in Chinese hacking that began in September 2015, when former President Barack Obama and Chinese leader Xi Jinping reached an agreement to end the hacking theft of commercial secrets. The agreement quelled U.S. anger over its charge that China is the “world’s most active and persistent perpetrator of economic espionage.”

U.S. prosecutors in 2014 indicted five PLA officers for economic espionage for hacking into firms like Westinghouse, U.S. Steel and Alcoa. The 56-page indictment said the five men worked for Unit 61398 of the PLA’s Third Department in Shanghai. The highly detailed complaint entered into details that U.S. officials later said were meant to “name and shame” China for commercial hacking.

Why China’s hackers may be getting back into the game is not readily clear. Renewed trade tensions may be a reason. President Donald Trump has threatened to impose $50 billion of tariffs on China-made products to cut the U.S. trade deficit of $375 billion with China.

Another factor may be the conclusion of a massive reorganization of China’s military, which began in late 2015 and under which various signals intelligence and cyber hacking units “were dissolved and absorbed into this one mega organization, called the Strategic Support Force,” said Priscilla Moriuchi, an expert on East Asia at Recorded Future, a cyber-threat intelligence firm based in Somerville, Mass.

China’s Xi has laid out ambitious goal of catching up with the United States and Europe in 10 key sectors, including aerospace, semiconductors and robotics, under its “Made in China 2025” program.

Moriuchi, who spent 12 years in the U.S. intelligence community, eventually leading the National Security Agency’s East Asia and Pacific cyber threats office, said China’s hackers are broadening tactics, burrowing into telecommunications networks even as they steal secrets to help party leaders achieve “Made in China 2025” goals.

“The sectors that they are going after are things like cloud computing, (Internet of Things), artificial intelligence, biomedicines, civilian space, alternative energy, robotics, rail, agricultural machinery, high-end medical devices,” Moriuchi said.

“There are companies in all of these sectors that have experienced intrusions over the past year from actors who are believed to be China state-sponsored,” she said.

Since early in the past decade, U.S. officials have alleged that Chinese state hackers were tasked with obtaining commercial secrets from Western corporations to help Chinese firms, many of them state-owned, overtake competitors to the global forefront in technology.

In a renewed warning alert for China, a March 22 report from the Office of the U.S. Trade Representative on China’s trade actions said, “Beijing’s cyber espionage against U.S. companies persists and continues to evolve.

So as you read about the stolen data from the Navy by China consider this: Should the NSA get inside the Chinese networks now and infect and or re-steal our intelligence?

Unmanned underwater vehicles take advantage of advanced ... photo

(Note: according to the Washington Post item below, the contractor is not named, however ‘Inside Defense’ in September of 2016 published an item that GD Electric Boat was awarded the $105.5 million contract modification moving it into the second phase.)

electric boat « Breaking Defense - Defense industry news ... photo

WaPo: Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials.

The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.

The officials did not identify the contractor.

Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library.

The Washington Post agreed to withhold certain details about the compromised missile project at the request of the Navy, which argued that their release could harm national security.

The data stolen was of a highly sensitive nature despite being housed on the contractor’s unclassified network. The officials said the material, when aggregated, could be considered classified, a fact that raises concerns about the Navy’s ability to oversee contractors tasked with developing cutting-edge weapons.

The breach is part of China’s long-running effort to blunt the U.S. advantage in military technology and become the preeminent power in east Asia. The news comes as the Trump administration is seeking to secure Beijing’s support in persuading North Korea to give up nuclear weapons, even as tensions persist between the United States and China over trade and defense matters.

The Navy is leading the investigation into the breach with the assistance of the FBI, officials said. The FBI declined to comment.

On Friday, the Pentagon inspector general’s office said that Defense Secretary Jim Mattis had asked it to review contractor cybersecurity issues arising from The Post’s story.
Navy spokesman Cmdr. Bill Speaks said, “There are measures in place that require companies to notify the government when a ‘cyber incident’ has occurred that has actual or potential adverse effects on their networks that contain controlled unclassified information.”

Speaks said “it would be inappropriate to discuss further details at this time.”

Altogether, details on hundreds of mechanical and software systems were compromised — a significant breach in a critical area of warfare that China has identified as a priority, both for building its own capabilities and challenging those of the United States.

“It’s very disturbing,” said former Sen. Jim Talent (R-Mo.,) who is a member of the U.S. China Economic and Security Review Commission. “But it’s a of a piece with what the Chinese have been doing. They are completely focused on getting advanced weapons technology through all kinds of means. That includes stealing secrets from our defense contractors.” Talent had no independent knowledge of the breach.
Undersea priority

The Sea Dragon project is an initiative of a special Pentagon office stood up in 2012 to adapt existing U.S. military technologies to new applications. The Defense Department, citing classification levels, has released little information about Sea Dragon other than to say that it will introduce a “disruptive offensive capability” by “integrating an existing weapon system with an existing Navy platform.” The Pentagon has requested or used more than $300 million for the project since late 2015 and has said it plans to start underwater testing by September.

Military experts fear that China has developed capabilities that could complicate the Navy’s ability to defend U.S. allies in Asia in the event of a conflict with China.

The Chinese are investing in a range of platforms, including quieter submarines armed with increasingly sophisticated weapons and new sensors, Adm. Philip S. Davidson said during his April nomination hearing to lead U.S. Indo-Pacific Command. And what they cannot develop on their own, they steal — often through cyberspace, he said.

“One of the main concerns that we have,” he told the Senate Armed Services Committee, “is cyber and penetration of the dot-com networks, exploiting technology from our defense contractors, in some instances.”

In February, Director of National Intelligence Daniel Coats testified that most of the detected Chinese cyber-operations against U.S. industry focus on defense contractors or tech firms supporting government networks.

In recent years, the United States has been scrambling to develop new weapons or systems that can counter a Chinese naval buildup that has targeted perceived weaknesses in the U.S. fleet. Key to the American advantage in any faceoff with China on the high seas in Asia will be its submarine fleet.

“U.S. naval forces are going to have a really hard time operating in that area, except for submarines, because the Chinese don’t have a lot of anti-submarine warfare capability,” said Bryan Clark, a naval analyst at the Center for Strategic and Budgetary Assessments. “The idea is that we are going to rely heavily on submarines in the early effort of any conflict with the Chinese.”

China has made closing the gap in undersea warfare one of its three top military priorities, and although the United States still leads the field, China is making a concerted effort to diminish U.S. superiority.

“So anything that degrades our comparative advantage in undersea warfare is of extreme significance if we ever had to execute our war plans for dealing with China,” said James Stavridis, dean of the Fletcher School of Law and Diplomacy at Tufts University and a retired admiral who served as supreme allied commander at NATO.

The U.S. military let its anti-ship weaponry languish after the Cold War ended because with the Soviet Union’s collapse, the Navy no longer faced a peer competitor on the seas. But the rapid modernization and buildup of the Chinese navy in recent years, as well as Russia’s resurgent forces at sea, have prompted the Pentagon to renew heavy investment in technologies to sink enemy warships.

The introduction of a supersonic anti-ship missile on U.S. Navy submarines would make it more difficult for Chinese warships to maneuver. It would also augment a suite of other anti-ship weapons that the U.S. military has been developing in recent years.
Ongoing breaches

For years, Chinese government hackers have siphoned information on the U.S. military, underscoring the challenge the Pentagon faces in safeguarding details of its technological advances. Over the years, the Chinese have snatched designs for the F-35 Joint Strike Fighter; the advanced Patriot PAC-3 missile system; the Army system for shooting down ballistic missiles known as Terminal High Altitude Area Defense; and the Navy’s new Littoral Combat Ship, a small surface vessel designed for near-shore operations, according to previous reports prepared for the Pentagon.

In some cases, suspected Chinese breaches appear to have resulted in copycat technologies, such as the drones China has produced that mimic U.S. unmanned aircraft.

[Chinese cyberspies stole a long list of U.S. weapons designs]

Speaks, the Navy spokesman, said: “We treat the broader issue of cyber intrusion against our contractors very seriously. If such an intrusion were to occur, the appropriate parties would be looking at the specific incident, taking measures to protect current information, and mitigating the impacts that might result from any information that might have been compromised.”

The Pentagon’s Damage Assessment Management Office has conducted an assessment of the damage, according to the U.S. officials. The Office of the Secretary of Defense declined to comment.

Theft of an electronic warfare library, Stavridis said, could give the Chinese “a reasonable idea of what level of knowledge we have about their specific [radar] platforms, electronically and potentially acoustically, and that deeply reduces our level of comfort if we were in a close undersea combat situation with China.”

Signals and sensor data is also valuable in that it presents China with the opportunity to “know when we would know at what distance we would be able to detect their submarines” — again a key factor in undersea battles.

Investigators say the hack was carried out by the Chinese Ministry of State Security, a civilian spy agency responsible for counterintelligence, foreign intelligence and domestic political security. The hackers operated out of an MSS division in the province of Guangdong, which houses a major foreign hacking department.

Although the Chinese People’s Liberation Army is far better-known than the MSS when it comes to hacking, the latter’s personnel are more skilled and much better at hiding their tracks, said Peter Mattis, a former analyst in the CIA counterintelligence center. The MSS, he said, hack for all forms of intelligence: foreign, military and commercial.

In September 2015, in a bid to avert economic sanctions, Chinese President Xi Jinping pledged to President Barack Obama that China would refrain from conducting commercial cyberespionage against the United States. Following the pact, China appeared to have curtailed much, although not all, of its hacking activity against U.S. firms, including by the People’s Liberation Army.

Both China and the United States consider spying on military technology to fall outside the pact. “The distinction we’ve always made is there’s a difference between conducting espionage in order to protect national security and conduct military operations, and the theft of intellectual property for the benefit of companies inside your country,” said Michael Daniel, the White House cybersecurity coordinator under Obama.

 

Fed Gov Spent $76 Billion in 2017 for Cyber Security, Fail v Success

Go here for the Forum Part One

Go here for the Forum Part Two

Fascinating speakers from private industry, state government and the Federal government describe where we are, the history on cyber threats and how fast, meaning hour by hour the speed at which real hacks, intrusions or compromise happen.

David Hoge of NSA’s Threat Security Operations Center for non-classified hosts worldwide describes the global reach of NSA including the FBI, DHS and the Department of Defense.

NSA Built Own 'Google-Like' Search Engine To Share ... photo

When the Federal government spent $76 billion in 2017 and we are in much the same condition, Hoge stays awake at night.

With North Korea in the constant news, FireEye published a report in 2017 known as APT37 (Reaper): The Overlooked North Korea Actor. North Korea is hardly the worst actor. Others include Russia, China, Iran and proxies.

Targeting: With North Korea primarily South Korea – though also Japan, Vietnam and the Middle East – in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare.
Initial Infection Tactics: Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyber espionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately.
Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.
Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time.
Malware: A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.

More information on this threat actor is found in our report, APT37 (Reaper): The Overlooked North Korean Actor.

** NSA 'building quantum computer to crack security codes ...  photo

Beyond NSA, DHS as with other agencies have cyber divisions. The DHS cyber strategy is found here. The fact sheet has 5 pillars:

DHS CYBERSECURITY GOALS
Goal 1: Assess Evolving
Cybersecurity Risks.
We will understand the evolving
national cybersecurity risk posture
to inform and prioritize risk management activities.
Goal 2: Protect Federal Government
Information Systems.
We will reduce vulnerabilities of federal agencies to ensure they achieve
an adequate level of cybersecurity.
Goal 3: Protect Critical
Infrastructure.
We will partner with key stakeholders
to ensure that national cybersecurity
risks are adequately managed.
Goal 4: Prevent and Disrupt Criminal
Use of Cyberspace.
We will reduce cyber threats by
countering transnational criminal
organizations and sophisticated cyber
criminals.
Goal 5: Respond Effectively to Cyber
Incidents.
We will minimize consequences from
potentially significant cyber incidents
through coordinated community-wide
response efforts.
Goal 6: Strengthen the Security and
Reliability of the Cyber Ecosystem.
We will support policies and activities
that enable improved global cybersecurity risk management.
Goal 7: Improve Management of
DHS Cybersecurity Activities.
We will execute our departmental
cybersecurity efforts in an integrated
and prioritized way.

Related reading:National Protection and Programs Directorate

NPPD’s vision is a safe, secure, and resilient infrastructure where the American way of life can thrive.  NPPD leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure.

*** Going forward as devices are invented and added to the internet and rogue nations along with criminal actors, the industry is forecasted to expand with experts and costs.

Research reveals in its new report that organizations are expected to increase spending on IT security by almost 9% by 2018 to safeguard their cyberspaces, leading to big growth rates in the global markets for cyber security.

The cyber security market comprises companies that provide products and services to improve security measures for IT assets, data and privacy across different domains such as IT, telecom and industrial sectors.

The global cyber security market should reach $85.3 billion and $187.1 billion in 2016 and 2021, respectively, reflecting a five-year compound annual growth rate (CAGR) of 17.0%. The American market, the largest segment, should grow from $39.5 billion in 2016 to $78.0 billion by 2021, demonstrating a five-year CAGR of 14.6%. The Asia-Pacific region is expected to grow the fastest among all major regions at a five-year CAGR of 21.4%, due to stringent government policies to mitigate cyber threats, and a booming IT industry.

Factors such as the growing complexity and frequency of threats, increasing severity of cyber security, stringent government regulations and compliance requirements, ubiquity of online communication, digital data and social media cumulatively should drive the market. Moreover, organizations are expected to increase IT spending on security solutions and services, as well. Rising adoption of technologies such as Internet of things, evolution of big data and cloud computing, increasing smartphone penetration and the developing market for mobile and web platforms should provide ample opportunities for vendors.

By solution type, the banking and financial segment generated the most revenue in 2015 at $22.2 billion. However, the defense and intelligence segment should generate revenues of $50.7 billion in 2021 to lead all segments. The healthcare sector should experience substantial growth with an anticipated 16.2% five-year CAGR.

Network security, which had the highest market revenue in 2015 based on solution type, should remain dominant through the analysis period. Substantial growth is anticipated in the cloud security market, as the segment is expected to have a 27.2% five-year CAGR, owing to increasing adoption of cloud-based services across different applications.

“IT security is a priority in the prevailing highly competitive environment,” says BCC Research analyst Basudeo Singh. “About $100 billion will be spent globally on information security in 2018, as compared with $76.7 billion in 2015.”

Trumps’ 3 Executive Orders Take on Government Employees

Union Helps New Jobs In L.A. Go To 'Pot'

Primer: Why are there unions in the Federal government anyway? Anyone?

Highlights from the 2017 data:

–The union membership rate of public-sector workers (34.4 percent)
continued to be more than five times higher than that of private-
sector workers (6.5 percent). (See table 3.)

–Workers in protective service occupations and in education, training,
and library occupations had the highest unionization rates (34.7
percent and 33.5 percent, respectively). (See table 3.)

–Men continued to have a higher union membership rate (11.4 percent)
than women (10.0 percent). (See table 1.)

–Black workers remained more likely to be union members than White,
Asian, or Hispanic workers. (See table 1.)

–Nonunion workers had median weekly earnings that were 80 percent of
earnings for workers who were union members ($829 versus $1,041). (The
comparisons of earnings in this release are on a broad level and do not
control for many factors that can be important in explaining earnings
differences.) (See table 2.)

–Among states, New York continued to have the highest union membership
rate (23.8 percent), while South Carolina continued to have the lowest
(2.6 percent). (See table 5.)

Trump signs executive orders making it easier to fire feds, overhaul official time

President Donald Trump signed three executive orders Friday that aim to reduce the time it takes to fire poor-performing federal employees and overhaul federal employees union rights, including cuts to official time.

In a conference call with reporters on Friday, senior White House officials said the executive orders call back to a promise Trump made at his State of the Union address, in which he sought to empower every cabinet secretary with the authority to award good federal employees and to remove poor performers more quickly.

“Today, the president is fulfilling his promise to promote more efficient government by reforming our civil service rules,” said Andrew Bremberg, the assistant to the president and the director of the Domestic Policy Council. “These executive orders will make it easier to remove poor-performing employees and ensure that taxpayer dollars are more efficiently used.”

One of the executives orders aims to make it easier for agencies to fire poor-performing employees and makes it harder for those employees to hide adverse employment information when seeking re-employment at another agency.

The Government Accountability Office has found it takes between six months and a year, on average, to remove federal employees flagged for misconduct, plus an average of eight more months to resolve appeals.

“Every year, the Federal Employee Viewpoint Survey has consistently shown that less than one-third of federal employees believe the poor performers are adequately addressed by their agency,” Bremberg said.

Under this EO, agencies will be required to report disciplinary actions records and management of poor performers to the Office of Personnel Management.

Data from the Office of Personnel Management shows that federal employees are 44 times less likely to be fired than a private-sector worker.

The Trump administration first sought to make it easier to fire federal employees under the  VA Accountability and Whistleblower Protection Act.

Under that authority, the Veterans Affairs Department, under the first full year of the Trump administration, fired 2,537 people — about 500 more federal employees than the agency let go in 2016.

Cuts to official time

A second executive order would significantly reduce the amount of time that federal employees can be paid for union work while on-the-clock.

Under the executive order, federal employees would not be able to spend any more than 25 percent of their work hours on through official time.

The executive order calls on agencies to renegotiate contracts with labor unions and reduce official time by about two-thirds.

The White House claims more than 470 Veterans Affairs Department employees, including 47 full-time nurses, spend 100 percent of their work-hours on union-related business.

Renegotiated labor contracts

A third executive order would curtail the labor contract bargaining window between government and unions.

The terms of regotiated contracts would be overseen by a new Labor Relations Working Group, which the EO orders OPM to establish.

In addition, the executive order would require federal union contracts be posted to an online database, with the goal of promoting transparency.

Senior White House officials said a drawn-out bargaining benefits union negotiations. Federal agencies, they said, paid $16 million in salaries for union negotiators in 2016.

Elevating federal workforce? Or an ‘assault’ on feds?

OPM Director Jeff Pon said the executive orders will protect federal employees who are doing their jobs, while making it more efficient to remove those who are not.

“By holding poor performers accountable, reforming the use of taxpayer-funded union time, and focusing negotiations on issues that matter, we are advancing our efforts to elevate the federal workforce.  The vast majority of our employees are dedicated public servants who are dedicated to their missions and service to the American people.  It is essential that we honor their commitment, and these measures reflect just that,” Pon said in a statement.

J. David Cox, the president of the American Federation of Government Employees, said the president’s trio of executive orders would chip away at federal employees rights.

“This is President Trump taking retribution on an apolitical civil service workforce,” Cox said.

National Treasury Employees Union President Tony Reardon called the executives orders “an assault on federal employees.”

“Rather than promote efficiency in the federal sector, the administration is demanding federal workers lose their ability to challenge unfair, arbitrary and discriminatory firings and other actions. This would begin the process of dismantling the merit system that governs our civil service,” Reardon said in a statement.

Senate Homeland Security and Governmental Affairs Committee Chairman Ron Johnson (R-Wis.), signaled his support for the executive orders.

“These reforms will improve accountability and productivity in the federal workforce, and I applaud the Trump administration for taking action to restore the public interest as the top priority of government operations,” Johnson said.

Sen. James Lankford (R-Okla.), the chairman of the Regulatory Affairs and Federal Management Subcommittee, said the EOs would reign in employee unions’ influence over government operations.

“These executive orders strive to make the federal government more efficient, not only for the taxpayer, but for our great federal workers. We have thousands of federal employees who work very hard for the nation; it’s important that their work is not frustrated by the poor performance of a small few,” Lankford said.

China Annexed the DPRK, C’mon Admit it, China is an Adversary

Primer: The Fiscal 2019 NDAA includes impose a ban on technology products from Chinese firms such as ZTE and Huawei. Yet, North Korea has it courtesy of China.

And:

The Financial Crimes Enforcement Network (FinCEN) is issued this advisory to further alert financial institutions to North Korean schemes being used to evade U.S. and United Nations (UN) sanctions, launder funds, and finance the North Korean regime’s weapons of mass destruction (WMD) and ballistic
missile programs.

Private companies in China are not private at all. The Chinese state holds at least some stock and often a larger voting block. Private Chinese companies invests all over the world including Venezuela, United States, Britain as well as regions such as Latin America and Africa.

You can bet most of those companies in North Korea are actually owned by the Chinese State.

China does bad things and yet no world leader publicly states that fact nor declares China is an adversary while China has declared the United States as an adversary. President Xi, the now eternal ruler quotes a dynasty cliche ‘Tǒngzhì yīqiè zài yángguāng xià’, translation is rule everything under the sun.

So now we have ZTE: ZTE, once the scourge of U.S. authorities for its violations of Iran sanctions, has become a key source of evidence about North Korea’s use of the American financial system to launder money, said the people, who gave details about the confidential investigations on the condition of anonymity. Federal investigators have been poring through data supplied by ZTE to find links to companies that North Korea has used to tap into the U.S. banking system, the people said.

Using evidence from ZTE, prosecutors on June 14 filed a case seeking $1.9 million held in six U.S. bank accounts in the name of China’s Mingzheng International Trading Limited. Prosecutors allege that Mingzheng is a front company for a covert Chinese branch of North Korea’s state-run Foreign Trade Bank. Between October and November 2015, Mingzheng was a counterparty to 20 illicit wire transfers in violation of the International Emergency Economic Powers Act, according to prosecutors.

On Aug. 22, prosecutors in Washington filed a lawsuit seeking more than $4 million in funds tied to China’s Dandong Chengtai Trading Limited and a network of companies owned by Chi Yupeng, a Chinese national with close ties to North Korea’s military. That same day, the Treasury Department added Dandong Chengtai Trading and several of its business affiliates, as well as Mingzheng, to the sanctions list. More here.

During the negotiations for the talks between Kim Jung Un and President Trump, ZTE was thrown in the mix. Why? China made some demands during recent trade talks. It was just announced that Trump imposed a $1.5 billion fine on ZTE and relayed that to President Xi. More negotiations and the final fine was $1.3 billion and alter the Board members of ZTE, which means that China state cannot have any management or vote. China will skirt that too. How so?

AEI explained it for us and quite well.

One of the substantial challenges in curtailing North Korea’s nuclear program is preventing Chinese companies from doing business with their pals in Pyongyang. Usually, Chinese companies in North Korea operate through networks of shell companies to avoid falling afoul of US and international sanctions. And most of these companies are small in scope and can easily rebrand themselves if caught. Enter Zhongxing Telecommunications Equipment (ZTE), not a small, expendable subsidiary, but instead a large PRC state-owned enterprise (SOE) with over 74,000 employees.

ZTE has transferred US technology to North Korea, supplying the Kim regime with US telecommunications tech that strengthens its defense capabilities by allowing it indirect access to US semiconductors (dual use technology for communications).  For that and other transgressions — including violating US Iran sanctions — ZTE paid a monster fine and entered into an agreement with the US to cease and desist. It was caught violating that agreement and banned from business with the United States as a result.

But President Trump offered China’s state-owned ZTE a lifeline via a May 13 tweet. Apparently, all that it took was for Chinese President Xi to dangle access for US agriculture exports to China in exchange for allowing ZTE to continue to do business with American firms. For what it’s worth, the president denied intending to lift the sales ban, but then followed up to describe a punishment that includes lifting the sales ban.

What’s Donald Trump’s message to Beijing (and Pyongyang and Tehran)? Companies that matter to China’s top leadership can violate US sanctions with impunity. All it takes is the will to blackmail the US and large Chinese SOEs will have carte blanche to supply the rogue regimes of the world.

Remember, Chinese SOEs that do business with North Korea are not motivated merely by profit. Instead, they are motivated by policy directives that originate in the Chinese Communist Party. Historically, China’s position on North Korea has been fairly opaque, yet its continued trade with the regime indicates Beijing has an interest in its wellbeing, in direct opposition to US interests and overall security in Asia.

At the end of the day, President Trump says he wants to cripple North Korea’s nuclear program. If North Korean dictator Kim Jong Un won’t denuclearize voluntarily, the US will have to rely on “maximum pressure,” including aggressive sanctions. Forgiving ZTE for violating US law is yet another example of the US shooting itself in the foot in dealing with North Korea. And probably not the last.

Meanwhile, as North Korea blew up the tunnels leading to the already destroyed nuclear test site, no one has asked where are those nuclear weapons now? No one has mentioned other possible military dimension sites or missile locations. Just as a reminder: