2 Deadly Explosions Rock Beirut

President Trump along with officials at the Pentagon are calling this an attack.

Primer: Tensions in Lebanon are high for a number of reasons, one being that Hezbollah faces a United Nations tribunal verdict on Friday in relation to the 2005 assassination of former Prime Minister Rafic Hariri. The head of Lebanon’s domestic security service has ridiculed the notion that fireworks were involved. He told reporters that the incident is a result of highly explosive materials being stored in a port warehouse. Maj. Gen. Abbas Ibrahim refused to give further comment pending the outcome of the investigation. It should be noted here that while Ibrahim has good links to Western intelligence and counterterrorism units, his central interest rests in maintaining Lebanese political stability in avoidance of another civil war.

This is a hyper-relevant concern in the context of very significant political tensions over Lebanon’s growing economic crisis and an associated increase of pressure on the Lebanese Hezbollah. Identifying the explosives as the cause, while saying they had been stored over a period of time, allows Ibrahim to put Hezbollah on notice without directly confronting the group. But why those explosives would be stored in a highly traveled population center and not on a military base is unclear.

AFP/ Beirut: Two huge explosion rocked the Lebanese capital Beirut on Tuesday, wounding dozens of people, shaking buildings and sending huge plumes of smoke billowing into the sky.

Lebanese media carried images of people trapped under rubble, some bloodied, after the massive explosions, the cause of which was not immediately known.

A security source confirmed that two explosions shook the port area of the city, Lebanon’s largest urban area, leaving dozens wounded.

An AFP correspondent at the scene said every shop in the Hamra commercial district had sustained damage, with entire shopfronts destroyed, windows shattered and many cars wrecked.

 

Injured people were walking in the street, while outside the Clemenceau Medical Centre, dozens of wounded people, many covered in blood, were rushing to be admitted to the centre including children.

Destroyed cars had been abandoned in the street with their airbags inflated.

A huge cloud of black smoke was engulfing the entire port area, the AFP correspondent said.

The loud blasts in Beirut’s port area were felt across the city and beyond and some districts lost electricity.

“Buildings are shaking,” tweeted one resident, while another wrote: “An enormous, deafening explosion just engulfed Beirut. Heard it from miles away.”

Online footage from a Lebanese newspaper office showed blown out windows, scattered furniture and demolished interior panelling.

The explosions came at a time when Lebanon is suffering its worst economic crisis in decades, which has left nearly half of the population in poverty.

Lebanon’s economy has collapsed in recent months, with the local currency plummeting against the dollar, businesses closing en masse and poverty soaring at the same alarming rate as unemployment.

The explosions also come as Lebanon awaits the verdict on Friday on the 2005 murder of former Lebanese premier Rafic Hariri, killed in a huge truck bomb attack.

Four alleged members of the Shiite Muslim fundamentalist group Hezbollah are on trial in absentia at the court in the Netherlands over the huge Beirut suicide bombing that killed Sunni billionaire Hariri and 21 other people.

A woman in the city centre told AFP: “It felt like an earthquake … I felt it was bigger than the explosion in the assassination of Rafic Hariri in 2005”.

Chinese Embassy in San Francisco Still Open, Why?

Primer: The Chinese consulate in San Francisco is harboring a biology researcher who falsely denied connections to the Chinese military to obtain a visa and gain access to the country, according to court documents filed by the FBI.

The filing came as part of a document that cited a slew of other episodes in which Chinese nationals allegedly lied on their visa applications by hiding their military connections. More details.

FBI Arrests Chinese Researcher for Visa Fraud After She ... source

Axios: 

Every country spies. And many countries — including the U.S. — use their diplomatic outposts to do it. But for years, China has used its embassies and consulates to do far more than that.

Why it matters: The Trump administration’s recent hardline stance against China’s illicit consular activities is a public acknowledgment of real problems, but it comes at a time when U.S.-China relations are already dangerously tense.

Driving the news: Last week, the U.S. demanded that China close its Houston consulate in order to “protect American intellectual property and Americans’ private information,” White House National Security Council spokesperson John Ullyot said in a statement.

  • In response, the Chinese government ordered the closure of the U.S. consulate in Chengdu, a facility nestled in China’s more remote inland region that served primarily as a visa-issuing office for Chinese hoping to visit the U.S., and was not a major hub for U.S. intelligence activity.

Yes, but: The Houston consulate wasn’t China’s most important espionage hub.

  • “San Francisco is the real gem but the U.S. won’t close it,” a former U.S. intelligence official told Axios.
  • It indicates the Trump administration is likely making an example of the Houston consulate in a bid to achieve its goal of a reduction in Chinese espionage activities without taking an even harsher measure, such as closing the San Francisco or New York consulates.

The Chinese government has long used its embassy and consulates in the U.S. to exert control over student groups, collect information on Uighurs and Chinese dissident groups, and coordinate local and state level political influence activities.

Surveilling Uighurs: Leaked classified Chinese government documents have revealed that Chinese embassies and consulates are complicit in the ongoing cultural and demographic genocide against Uighurs.

  • The CCP has sought to track down Uighurs who have left China and force them to return, with orders to place them in mass internment camps “the moment they cross the border.”
  • China’s embassies and consulates have also collected information on Uighurs abroad and submitted that information to Xinjiang police.
  • Consular officials have frequently refused to renew Uighur passports, telling them they must return to China in order to obtain new documents — only to be disappeared into camps as soon as they do.

Controlling Chinese students: The Chinese embassy and consulates keep close tabs on Chinese students in the U.S., occasionally sending them political directives and quietly organizing demonstrations.

  • The Chinese embassy and consulates have paid students to demonstrate in support of visiting Chinese leaders, instructing them to crowd out anti-CCP protesters. They have also asked Chinese Students and Scholars Associations (CSSA) presidents to hold study sessions on party thought and to send back photos of the sessions to ensure compliance.
  • “I feel like the tendency is that the consulate tries to control CSSAs more and more,” one CSSA president told me in 2018.

Supporting United Front organizations: Chinese diplomatic officials regularly meet with leaders of U.S.-based organizations tied to the United Front Work Department, the political influence arm of the CCP, and preside over the ceremonies and banquets held by these organizations.

  • One such organization, the National Association for China’s Peaceful Unification, has branches in more than 30 U.S. cities. Its members issue statements in support of China’s official foreign policy positions, and the Chinese embassy and consular officials encourage them to engage in local U.S. politics.

The bottom line: Dealing with bad behavior by diplomats is a highly sensitive geopolitical issue that can easily result in damaged relations.

Go deeper … Mapped: Where U.S. and Chinese embassies and consulates are located

***

In part, how big a problem does the U.S. have regarding Chinese spies around the nation?

Economic Espionage

To achieve its goals and surpass America, China recognizes it needs to make leaps in cutting-edge technologies. But the sad fact is that instead of engaging in the hard slog of innovation, China often steals American intellectual property and then uses it to compete against the very American companies it victimized—in effect, cheating twice over. They’re targeting research on everything from military equipment to wind turbines to rice and corn seeds.

Through its talent recruitment programs, like the so-called Thousand Talents Program, the Chinese government tries to entice scientists to secretly bring our knowledge and innovation back to China—even if that means stealing proprietary information or violating our export controls and conflict-of-interest rules.

Take the case of scientist Hongjin Tan, for example, a Chinese national and American lawful permanent resident. He applied to China’s Thousand Talents Program and stole more than $1 billion—that’s with a “b”—worth of trade secrets from his former employer, an Oklahoma-based petroleum company, and got caught. A few months ago, he was convicted and sent to prison.

Or there’s the case of Shan Shi, a Texas-based scientist, also sentenced to prison earlier this year. Shi stole trade secrets regarding syntactic foam, an important naval technology used in submarines. Shi, too, had applied to China’s Thousand Talents Program, and specifically pledged to “digest” and “absorb” the relevant technology in the United States. He did this on behalf of Chinese state-owned enterprises, which ultimately planned to put the American company out of business and take over the market.

In one of the more galling and egregious aspects of the scheme, the conspirators actually patented in China the very manufacturing process they’d stolen, and then offered their victim American company a joint venture using its own stolen technology. We’re talking about an American company that spent years and millions of dollars developing that technology, and China couldn’t replicate it—so, instead, it paid to have it stolen.

And just two weeks ago, Hao Zhang was convicted of economic espionage, theft of trade secrets, and conspiracy for stealing proprietary information about wireless devices from two U.S. companies. One of those companies had spent over 20 years developing the technology Zhang stole.

These cases were among more than a thousand investigations the FBI has into China’s actual and attempted theft of American technology—which is to say nothing of over a thousand more ongoing counterintelligence investigations of other kinds related to China. We’re conducting these kinds of investigations in all 56 of our field offices. And over the past decade, we’ve seen economic espionage cases with a link to China increase by approximately 1,300 percent.

The stakes could not be higher, and the potential economic harm to American businesses and the economy as a whole almost defies calculation. More details here.

 

Russian ‘Dukes’ Overtly Hack Vaccine Trial Data

Primer: Will this cause an Article 5 response?

In response to malicious activity targeting COVID-19 research and vaccine development in the United States, United Kingdom (UK), and Canada, the Cybersecurity and Infrastructure Security Agency (CISA), UK’s National Cyber Security Centre (NCSC), Canada’s Communications Security Establishment (CSE), and the National Security Agency (NSA) released a Joint Cybersecurity Advisory to expose the threat. A malicious cyber actor is using a variety of tools and techniques to target organizations involved in COVID-19 research and vaccine development.

Tools include SOREFANG, WELLMESS, and WELLMAIL malware.

CISA encourages users and administrators to review the Joint Cybersecurity Advisory and the following Malware Analysis Reports for more information and to apply the mitigations provided.

LONDON (AP) — Britain, the United States and Canada accused Russia on Thursday of trying to steal information from researchers seeking a COVID-19 vaccine.

The three nations alleged that hacking group APT29, also known as Cozy Bear and said to be part of the Russian intelligence service, is attacking academic and pharmaceutical research institutions involved in coronavirus vaccine development.

UK, US, Canada accuse Russia of hacking virus vaccine ... source

Britain’s National Cybersecurity Centre made the announcement, which was coordinated with authorities in the U.S. and Canada.

“It is completely unacceptable that the Russian Intelligence Services are targeting those working to combat the coronavirus pandemic,″ Foreign Secretary Dominic Raab said in a statement. “While others pursue their selfish interests with reckless behaviour, the U.K. and its allies are getting on with the hard work of finding a vaccine and protecting global health.″

The persistent and ongoing attacks are seen by intelligence officials as an effort to steal intellectual property, rather than to disrupt research. The campaign of “malicious activity″ is ongoing and includes attacks “”predominantly against government, diplomatic, think-tank, healthcare and energy targets,″ the National Cybersecurity Centre said in a statement.

It was unclear whether any information actually was stolen but the center says individuals’ confidential information is not believed to have been compromised. The Russian Foreign Ministry did not immediately respond to a request for comment.

Cozy Bear, also known as the “dukes,″ has been identified by Washington as one of two Russian government-linked hacking groups that broke into the Democratic National Committee computer network and stole emails ahead of the 2016 presidential election. The other group is usually called Fancy Bear.

The director of operations for the British cybersecurity center, Paul Chichester, urged “organizations to familiarize themselves with the advice we have published to help defend their networks.”

The statement did not say whether Russian President Vladimir Putin knew about the vaccine research hacking, but British officials believe such intelligence would be highly prized.

A 16-page advisory made public by Britain, the U.S. and Canada on Thursday accuses Cozy Bear of using custom malicious software to target a number of organizations globally. The malware, called WellMess and WellMail, has not previously been associated with the hacking group, the advisory said.

“In recent attacks targeting COVID-19 vaccine research and development, the group conducted basic vulnerability scanning against specific external IP addresses owned by the organizations. The group then deployed public exploits against the vulnerable services identified,” the advisory said.

The U.S. Department of Homeland Security’s cybersecurity agency warned in April that cybercriminals and other groups were targeting COVID-19 research, noting at the time that the increase in people teleworking because of the pandemic had created potential avenues for hackers to exploit.

Vulnerable targets include health care agencies, pharmaceutical companies, academia, medical research organizations, and local governments, security officials have said.

The global reach and international supply chains of these organizations also make them vulnerable, the U.S. Cybersecurity and Infrastructure Security Agency said in an alert published in conjunction with its counterparts in Britain.

CISA said it and the British cyberseucity agency have detected the threat groups scanning the external websites of targeted companies and looking for vulnerabilities in unpatched software. It did not name any of the targeted companies.

U.S. authorities have for months leveled similar accusations against China. FBI Director Chris Wray said last week, “At this very moment, China is working to compromise American health care organizations, pharmaceutical companies, and academic institutions conducting essential COVID-19 research.”

Law Enforcement Surveillance of BLM/Protests Goes Tech AI

Meet Dataminr, the leading artificial intelligence platform for real-time event and risk detection. In a world characterized by unexpected and rapidly moving events that can impact operations in innumerable and unforeseen ways, relevant information can surface anywhere at any time. Dataminr discovers, distills and delivers alerts from the increasingly diverse and complex landscape of publicly available information—including social media, blogs, information sensors, and the dark web—ensuring that businesses have the knowledge they need to act with confidence.

Build the Movement to Defeat Racism!/¡Construir un ... source

Back in January, The New York Post had a short article on how the NYPD on Monday was ordered to respond to a request for records related to its surveillance of Black Lives Matters protestors’ cell phones and social media.

The secret police documents were among a Freedom of Information Law request by the New York Civil Liberties Union on behalf of Millions March NYC, an activist group affiliated with the Black Lives Matter movement.

But, the Glomar response kicked in. What is that? It is used often actually. It is where an agency refuses to confirm or deny the existence of responsive records. The term “Glomar” originates from a case related to the CIA’s classified Glomar Explorer project, in which the agency sought to recover materials for military and intelligence purposes from a sunken Soviet submarine in the Pacific Ocean.

George Floyd protests: Trump blames 'antifa' for violence ... source

It is not just about Black Lives Matter, add in ANTIFA, The Youth Liberation Front and Boogaloo among others, perhaps even MS-13.

Okay, circling back to Dataminr.

Leveraging close ties to Twitter, controversial artificial intelligence startup Dataminr helped law enforcement digitally monitor the protests that swept the country following the killing of George Floyd, tipping off police to social media posts with the latest whereabouts and actions of demonstrators, according to documents reviewed by The Intercept and a source with direct knowledge of the matter.

Dataminr helps newsrooms, corporations, and governments around the world track crises with superhuman speed as they unfold across social media and the wider web. Through a combination of people and software, the company alerts organizations to chatter around global crises — wars, shootings, riots, disasters, and so forth — so that they’ll have a competitive edge as news is breaking. But the meaning of that competitive edge, the supercharged ability to filter out important events from the noise of hundreds of millions of tweets and posts across social media, will vary drastically based on the customer; the agenda of a newspaper using Dataminr to inform its breaking news coverage won’t be the same as the agendas of a bank or the FBI. It’s this latter category of Dataminr’s business, lucrative government work, that’s had the firm on the defensive in recent years.

In 2016, Twitter was forced to reckon with multiple reports that its platform was being used to enable domestic surveillance, including a Wall Street Journal report on Dataminr’s collaboration with American spy agencies in May; an American Civil Liberties Union report on Geofeedia, a Dataminr competitor, in October; and another ACLU investigation into Dataminr’s federal police surveillance work in December. The company sought to assure the public that attempts to monitor its users for purposes of surveillance were strictly forbidden under its rules, and that any violators would be kicked off the platform. For example, then-VP Chris Moody wrote in a company blog post that “using Twitter’s Public APIs or data products to track or profile protesters and activists is absolutely unacceptable and prohibited.” In a letter to the ACLU, Twitter public policy chief Colin Crowell similarly wrote that “the use of Twitter data for surveillance is strictly prohibited” and that “Datatminr’s product does not provide any government customers with … any form of surveillance.”

Dataminr continues to enable what is essentially surveillance by U.S. law enforcement entities, contradicting its earlier assurances to the contrary, even if it remains within some of the narrow technical boundaries it outlined four years ago, like not providing direct firehose access, tweet geolocations, or certain access to fusion centers.

Dataminr relayed tweets and other social media content about the George Floyd and Black Lives Matter protests directly to police, apparently across the country. In so doing, it used to great effect its privileged access to Twitter data — despite current terms of service that explicitly bar software developers “from tracking, alerting, or monitoring sensitive events (such as protests, rallies, or community organizing meetings)” via Twitter.

And despite Dataminr’s claims that its law enforcement service merely “delivers breaking news alerts on emergency events, such as natural disasters, fires, explosions and shootings,” as a company spokesperson told The Intercept for a previous report, the company has facilitated the surveillance of recent protests, including nonviolent activity, siphoning vast amounts of social media data from across the web and converting it into tidy police intelligence packages.

Dataminr’s Black Lives Matter protest surveillance included persistent monitoring of social media to tip off police to the locations and activities of protests, developments within specific rallies, as well as instances of alleged “looting” and other property damage. According to the source with direct knowledge of Dataminr’s protest monitoring, the company and Twitter’s past claims that they don’t condone or enable surveillance are “bullshit,” relying on a deliberately narrowed definition. “It’s true Dataminr doesn’t specifically track protesters and activists individually, but at the request of the police they are tracking protests, and therefore protesters,” this source explained. There is much more detail here from The Intercept.

So, if law enforcement in various locations has a partnership with Dataminr, it puts to question why destructive protests of an ongoing basis continues to happen costing lives, injuries and ruining business and livelihoods. Ah that is a question for governors, mayors, prosecutors and judges but you can be assured that in many cases arrests have been made and investigators have additional tools for build cases against alleged criminals.

So, if there is to be law and order and any kind of restoration to community peace or civil society, tools such as Dataminr are valuable that is if the unlawful acts are prosecuted in the first place.

 

 

Cold War with China Escalating due to S. China Sea?

South China Sea dispute - INSIGHTSIAS source

WSJ/HONG KONG—The U.S. plans to for­mally op­pose a swath of Chi­nese ter­ri­to­r­ial claims in the South China Sea, ac­cord­ing to peo­ple fa­mil­iar with the mat­ter, as Wash­ing­ton takes a harder line against Bei­jing’s ef­forts to as­sert con­trol over the strate­gic wa­ters.

While Wash­ing­ton has pre­vi­ously said it sees Bei­jing’s ex­pan­sive sov­er­eignty claims over most of the South China Sea as un­law­ful, the State De­part­ment is pre­paring to is­sue a po­si­tion pa­per that of­fi­cially re­jects spe­cific Chi­nese claims for the first time, the peo­ple said.

Such a ges­ture de­parts from past U.S. prac­tice of not tak­ing sides on ter­ri­to­r­ial dis­putes in the South China Sea, the peo­ple said.

The pa­per could be is­sued this week, the peo­ple said, just af­ter the fourth an­niver­sary of a 2016 rul­ing by an in­ternational tri­bunal that found no le­gal ba­sis for Bei­jing’s claims to his­toric and eco­nomic rights in most of the South China Sea.

Re­cently, the Trump ad­min­is­tra­tion has crit­i­cized Bei­jing for as­sert­ing “un­law­ful mar­itime claims” in the South China Sea while ramp­ing up naval op­er­a­tions to chal­lenge those claims This month, the U.S. sent two air­craft car­ri­ers to par­tic­i­pate in one of its largest naval ex­er­cises in re­cent years in the South China Sea—at the same time that China was hold­ing drills in the area.

The State De­part­ment didn’t im­me­di­ately re­spond to re­quests for com­ment.

China has re­peat­edly re­jected the rul­ing, is­sued by a tri­bunal at the Per­ma­nent Court of Ar­bi­tra­tion in The Hague fol­low­ing a le­gal chal­lenge brought by the Philip­pines in 2013. Bei­jing didn’t take part in the tri­bunal, which it has in­sisted had no ju­ris­dic­tion on the mat­ter. In­stead, China con­tin­ued ef­forts to build ar­ti­fi­cial is­lands around dis­puted South China Sea fea­tures and for­tify them with weaponry.

At the time of the rul­ing, the Obama ad­min­is­tra­tion called on rel­e­vant par­ties to re­spect it while stat­ing that the U.S. doesn’t take sides on spe­cific ter­ri­to­r­ial dis­putes in the South China Sea. Wash­ing­ton has long in­sisted that it has an in­ter­est in main­tain­ing free­dom of nav­i­ga­tion in the area.

In the pa­per, the U.S. would state that “Chi­na’s mar­itime claims pose the sin­gle great­est threat to the free­dom of the seas in mod­ern his­tory,” ac­cord­ing to a draft seen by The Wall Street Jour­nal. “We can­not af­ford to re-en­ter an era where states like China at­tempt to as­sert sov­er­eignty over the seas,” the draft said.

The U.S. re­jects a num­ber of Chi­nese claims to cer­tain ar­eas and fea­tures in the South China Sea that are also claimed by South­east Asian coun­tries, in­clud­ing Brunei, Ma­laysia, In­done­sia, the Philip­pines and Viet­nam, ac­cord­ing to the draft.

Wash­ing­ton also states its view that Chi­nese ef­forts to “ha­rass South­east Asian fish­ing or hy­dro­car­bon de­vel­op­ment, or to uni­lat­er­ally un­der­take such ac­tiv­i­ties on its own, in these ar­eas, are un­law­ful,” ac­cord­ing to the draft.

***

The U.S. is not a party of the UN Law of the Sea treaty that sets out a mechanism for the resolution of disputes. Despite that, the State Department noted that China and its neighbors, including the Philippines, are parties to the treaty and should respect the decision.

The United States has no claims to the waters but has deployed warships and aircraft for decades to patrol and promote freedom of navigation and overflight in the busy waterway.

China claims almost all of the South China Sea and routinely objects to any action by the U.S. military in the region. Five other governments claim all or part of the sea, through which approximately $5 trillion in goods are shipped every year.

China has sought to shore up its claim to the sea by building military bases on coral atolls, leading the U.S. to sail warships through the region in what it calls freedom of operation missions. More here.