Foreign Espionage Silicon Valley and Presidio

One of the more corrupt locations in the country is San Francisco. Within the Bay Area is a former military base now turned all elite real estate known as Presidio. Within Presidio is the Presidio Trust. Yikes, taxpayer dollars pay out big bonuses there. The largest Federal bonus was paid to Bart Ferrell, a Human Resources Manager, who processes the payroll for the Presidio Trust.

Presidio Trust endorses museum, hotel and theaters for the ...

What the heck is going on in the Bay Area? Point to Senator Feinstein for those answers. But here is a BIG clue. Dianne sits on the Senate Intelligence Committee…..sheesh….as you read below, it becomes evident of the expulsion of several Russians….but no Chinese?

As you read through this chilling summary, consider the Hillary Russian conspiracy/collusion operation with Skulkovo.

The Clintons also strengthened their coffers. Three key transactions compose their pro-Kremlin graft.

• “The Ex-Im Bank would welcome an application for financing from Rosavia to support its purchase of Boeing aircraft,” Hillary said in Moscow on October 13, 2009. Three days later, according to the Washington Post, “Boeing formally submitted its bid for the Russian deal.” Kremlin-owned Rostekhnologii decided on June 1, 2010, to buy up to 50 Boeing 737s for Aeroflot, Russia’s national airline. Price: $3.7 billion.

That August 17, Boeing gave the Clinton Foundation $900,000 to “help support the reconstruction of Haiti’s public-education system” after a severe earthquake the previous January.

• Hillary pushed Skolkovo, “a high-tech corridor in Russia modeled after our own Silicon Valley,” as she explained in Moscow in October 2009. Her State Department colleagues encouraged 22 top American venture capitalists to tour Skolkovo in May 2010.

State convinced Cisco, Google, and Intel, among others, to open shop in Skolkovo. By 2012, 28 “Key Partners” from the U.S., Europe, and Russia supported this project.

But the U.S. Army Foreign Military Studies Program warned in 2013: “Skolkovo is arguably an overt alternative to clandestine industrial espionage.” Lucia Ziobro, a top FBI agent in Boston, explained in 2014: “The FBI believes the true motives of the Russian partners, who are often funded by their government, is to gain access to classified, sensitive, and emerging technology from the companies.”

'Silicon Valley' season 3 opening sequence - Business Insider

How Silicon Valley Became a Den of Spies

The West Coast is a growing target of foreign espionage. And it’s not ready to fight back.

SAN FRANCISCO—In the fall of 1989, during the Cold War’s wan and washed-out final months, the Berlin Wall was crumbling—and so was San Francisco. The powerful Loma Prieta earthquake, the most destructive to hit the region in more than 80 years, felled entire apartment buildings. Freeway overpasses shuddered and collapsed, swallowing cars like a sandpit. Sixty-three people were killed and thousands injured. And local Soviet spies, just like many other denizens of the Bay Area, applied for their share of the nearly $3.5 billion in relief funds allocated by President George H.W. Bush.

FBI counterintelligence saw an opening, recalled Rick Smith, who worked on the Bureau’s San Francisco-based Soviet squad from 1972 to 1992. When they discovered that a known Soviet spy, operating under diplomatic cover, had filed a claim, Smith and several other bureau officials posed as federal employees disbursing relief funds to meet with the spy. The goal was to compromise him with repeated payments, then to turn him. “We can offer your full claim,” Smith told the man. “Come meet us again.” He agreed.

But the second time, the suspected intel officer wasn’t alone. FBI surveillance teams reported that he was being accompanied by a Russian diplomat known to the FBI as the head of Soviet counterintelligence in San Francisco. The operation, Smith knew, was over—the presence of the Soviet spy boss meant that the FBI’s target had reported the meeting to his superiors—but they had to go through with the meeting anyway. The two Soviet intelligence operatives walked into the office room. The undercover FBI agents, who knew the whole affair had turned farcical, greeted the Soviet counterintelligence chief.

“What,” he replied, “You didn’t expect me to come?”

We tend to think of espionage in the United States as an East Coast phenomenon: shadowy foreign spies working out of embassies in Washington, or at missions to the United Nations in New York; dead drops in suburban Virginia woodlands, and surreptitious meetings on park benches in Manhattan’s gray dusk.

But foreign spies have been showing up uninvited, to San Francisco and Silicon Valley for a very long time. According to former U.S. intelligence officials, that’s true today more than ever. In fact, they warn—especially because of increasing Russian and Chinese aggressiveness, and the local concentration of world-leading science and technology firms—there’s a full-on epidemic of espionage on the West Coast right now. And even more worrisome, many of its targets are unprepared to deal with the growing threat.

Unlike on the East Coast, foreign intel operations here aren’t as focused on the hunt for diplomatic secrets, political intelligence or war plans. The open, experimental, cosmopolitan work and business culture of Silicon Valley in particular has encouraged a newer, “softer,” “nontraditional” type of espionage, said former intelligence officials—efforts that mostly target trade secrets and technology. “It’s a very subtle form of intelligence collection that is more business connected and oriented,” one told me. But this economic espionage is also ubiquitous. Spies “are very much part of the everyday environment” here, said this person. Another former intelligence official told me that, at one point recently, a full 20 percent of all the FBI’s active counterintelligence-related intellectual property cases had originated in the Bay Area. (The FBI declined to comment for this story.)

Political espionage happens here, too. China, for example, is certainly out to steal U.S. technology secrets, noted former intelligence officials, but it also is heavily invested in traditional political intelligence gathering, influence and perception-management operations in California. Former intelligence officials told me that Chinese intelligence once recruited a staff member at a California office of U.S. Senator Dianne Feinstein, and the source reported back to China about local politics. (A spokesperson for Feinstein said the office doesn’t comment on personnel matters or investigations, but noted that no Feinstein staffer in California has ever had a security clearance.) At the Aspen Security Forum last week, FBI director Chris Wray acknowledged the threat Chinese spying in particular poses, saying, “China from a counterintelligence perspective represents the broadest, most pervasive, most threatening challenge we face as a country.”

Making it even more complicated, said multiple former U.S. intel officials, many foreign intel “collectors” in the Bay Area are not spies in the traditional sense of the term. They aren’t based out of embassies or consulates, and may be associated with a state-owned business or research institute rather than an intelligence agency. Chinese officials, in particular, often cajole or outright threaten Chinese nationals (or U.S. citizens with family members in China) working or studying locally to provide them with valuable technological information.

“You get into situations where you have really good, really bright, conscientious people, twisted by their home government,” said a chief security officer at a major cloud storage company whose company maintains sensitive government contracts. U.S.-based Chinese employees of this company have had Chinese government officials attempt to “leverage” these individuals’ family members in China, this person told me. The company now requires employees working on certain projects to be U.S. citizens.

And yet, it’s not clear that the Bay Area—historically famous for its liberalism, and now infamous for its madcap capitalism—is prepared to handle this escalation and these new tactics. Tech firms, especially start-ups, lack incentives to report potential espionage to U.S. officials; and businesses and universities are often ignorant about the espionage threat, or so attuned to local political sensitivities they may fear being accused of stereotyping if they attempt to institute more stringent defensive security and screening measures.

As Silicon Valley continues to take over the world, the local spy war will only get hotter—and the consequences will resonate far beyond Northern California. This story is based on extensive conversations with more than half a dozen former intelligence community officials with direct knowledge of, or experience with, U.S. counterintelligence activities in the Bay Area. All requested anonymity to discuss sensitive matters more openly. A few other individuals, all of whom worked counterintelligence in the Bay Area from the early 1970s through the mid-2000s, agreed to be interviewed on the record.

As one former senior intelligence official put it: “San Francisco is a trailblazer—you see the changes there in foreign counterintelligence first. Trends emerge there.” If we want to understand a world where Russian and Chinese are ramping up their spy games against the United States, then we need to pay attention to what’s happening in San Francisco.

***

Russian intelligence has had an intensive interest in San Francisco stretching back to the beginning of the Cold War. In those days, the Russians were primarily gathering information on local military installations, said former officials, including the Presidio, the strategically located former military base set on a wind-swept northern tip of the San Francisco peninsula, overlooking the Golden Gate Bridge.

Since then, Russian operations have become bolder, with one notable exception: the immediate post-Cold War period. “The only time there was a collective sigh regarding Russia, like maybe things have changed, was under Gorbachev,” said LaRae Quy, who worked on Russian and Chinese counterintelligence in the Bay Area from 1985 to 2002. “We even put in a big ‘Going Out Of Business’ sign in the Palo Alto squad room.”

But this optimism quickly faded when Putin was elected in 2000, recalled Quy, who retired in 2006. “Russia has been steadily escalating since then.”

As the Bay Area transformed itself into a tech hub, Russia adapted its efforts accordingly, with Russian spies increasingly focused on obtaining information on valuable, sensitive or potentially duel-use technologies—those with both civilian and military applications—being developed or financed by companies or venture-capital firms based in the region. Russia’s espionage activities have traditionally been centered on its San Francisco Consulate, which was forcibly closed by the Trump administration in early September 2017.

But even with the consulate shuttered, there are alternative vehicles for Russian intelligence-gathering in Silicon Valley. One potential mechanism, said three former intelligence officials, is Rusnano USA, the sole U.S. subsidiary of Rusnano, a Russian government-owned venture capital firm primarily focused on nanotechnology. Rusnano USA, which was founded in 2011, is located in Menlo Park, near Stanford University. “Some of the [potential intelligence-gathering] activities Rusnano USA was involved in were not only related to the acquisition of technology, but also inserting people into venture capital groups, in developing those relationships in Silicon Valley that allowed them to get their tentacles into everything,” one former intelligence official told me. “And Rusnano USA was kind of the mechanism for that.”

Rusnano’s interests, said this former official, have extended to technology with both civilian and potential military applications. U.S. intelligence officials were very concerned about contacts between Rusnano USA employees and suspected Russian intelligence officers based at Russia’s San Francisco Consulate and elsewhere, this person said. “The Russians treated [Rusnano USA] as an intelligence platform, from which they launched operations,” said another former U.S. intelligence official. (Rusnano USA and the Russian Embassy in Washington, did not respond to requests for comment.)

Russia also employs older, tried-and-true methods locally. Intel officials have suspected that Russian spies were enlisting local high-end Russian and Eastern European prostitutes, in a classic Russian “honeypot” maneuver, to gather information from (and on) Bay Area tech and venture-capital executives. Sex workers targeting executives at high-end bars and nightclubs such as the Rosewood Sand Hill, an ultra-luxury hotel located near many of Silicon Valley’s top financial firms—infamous for its raucous, hook-up oriented Thursday nights—the Redwood Room, a tony bar located in the Clift Hotel in downtown San Francisco, and other spots have been identified as potentially reporting back to Russian intel officers, said another former official. “If I were a Russian intelligence officer, and I knew that these high-end girls were dragging CEOs of major companies back to their rooms, I’d be paying them for info too,” said this person. “It’s that whole idea of concentric rings: You don’t need to be on the inside, you just need somebody on the inside that you have access to.”

***

Russia’s interference in the 2016 presidential election has given Putin’s regime an outsized role in the national conversation on espionage. But talk to former intel officials, and many will say that China poses an equal, if not greater, long-term threat. “The Chinese just have vast resources,” said Kathleen Puckett, who worked counterintelligence in the Bay Area from 1979 to 2007. “They have all the time in the world, and all the patience in the world. Which is what you need more than anything.” (China’s Embassy in Washington, did not respond to requests for comment.)

Because of California’s economic and political importance, as well as its large, well-established, and influential émigré and Chinese-American communities, the People’s Republic places great weight on its intelligence activities here, said multiple former intelligence officials. Indeed, two told me that California is the only U.S. state to which the Ministry of State Security—China’s main foreign intelligence agency—has had a dedicated unit, focused on political intelligence and influence operations. (China has had a similar unit for Washington.)

And if California is elevated among Chinese interests, San Francisco is like “nirvana” to the MSS, said one former official, because of the potential to target community leaders and local politicians who may later become mayors, governors or congressmen. Their efforts are becoming increasingly sophisticated.

Sometimes these recruitment efforts have been successful. According to four former intelligence officials, in the 2000s, a staffer in Senator Dianne Feinstein’s San Francisco field office was reporting back to the MSS. While this person, who was a liaison to the local Chinese community, was fired, charges were never filed against him. (One former official reasoned this was because the staffer was providing political intelligence and not classified information—making prosecution far more difficult.) The suspected informant was “run” by officials based at China’s San Francisco Consulate, said another former intelligence official. The spy’s handler “probably got an award back in China” for his work, noted this former official, dryly.

Or take the case of Rose Pak. Pak, who died in September 2016, was for decades one of San Francisco’s preeminent political power brokers. Though she never held elective office, she was famous for making and unmaking mayors, city councilmen (or “supervisors,” as they’re known in San Francisco), and pushing city contracts to her allies and constituents in Chinatown.

According to four former intelligence officials, there were widespread concerns that Pak had been co-opted by Chinese intelligence, and was wielding influence over San Francisco politics in ways purposefully beneficial to the Chinese government. Another worry, U.S. officials said, was Pak’s role in organizing numerous junkets to China, sometimes led by Pak in person and attended (often multiple times) by many prominent Bay Area politicians, including former San Francisco Mayor Ed Lee, who died while in office in 2017. Political junkets are used by Chinese intelligence for surveillance (“every single hotel room is bugged,” one former official told me) and collection purposes, as well as for spotting and assessing potential recruits, said former intel officials. (There is no indication that Pak herself participated in, or had knowledge of, specific intelligence-gathering efforts.) Concerns about Pak’s links to the Chinese Communist Party occasionally percolated into local political debate, but the intelligence community’s identification of Pak as a likely agent of influence for Beijing is being reported here for the first time.

Occasionally, Chinese intelligence activities in San Francisco burst into plain view. Consider the story—and it is an incredible one, also told here for the first time—of the 2008 Olympic Torch Run. San Francisco was the only U.S. city to host the Olympic torch as it made its way, tortuously, to Beijing. And Chinese officials were very concerned about disruptions to the run by protesters, as well as in managing the image China projected to the rest of the world in the run-up to the games.

So they decided to leave nothing to chance. According to three former intelligence officials, Chinese MSS and Ministry of Public Security (MPS) officers flew in to San Francisco from abroad for the occasion, joining suspected MSS officers based in the Bay Area. (At the time, the diplomat responsible for Overseas Chinese Affairs at China’s San Francisco Consulate was a suspected MSS officer, said two of these former officials.) U.S. officials watched as Chinese intelligence officers filmed Tibetan monks on their march across the Golden Gate Bridge, and known Chinese spies surveilled a pro-Tibet rally downtown featuring Desmond Tutu and Richard Gere. Chinese spies also recorded participants in a Falun Gong rally in Union Square, and shot footage of protestors at the torch run itself.

Most brazenly, said former intelligence agents, Chinese officials bussed in 6,000-8,000 J-Visa holding students—threatening them with the loss of Chinese government funding—from across California to disrupt Falun Gong, Tibetan, Uighur and pro-democracy protesters. (They even provided these students with a box lunch.) “I’m not sure they would have pulled out these stops in any other city, but San Francisco is special” to China, said a former senior U.S. official.

Counterintelligence officers possessed advance knowledge about some aspects of this operation and observed Chinese intelligence officers, who often wore earpieces connected to a radio, managing the movements of counterprotesters, directing blocs of pro-PRC students to intimidate, disrupt and overwhelm anti-Beijing protesters across the parade route. Chinese intelligence officers would “communicate with each other, and say, ‘We’ve got three Tibetan monks about to do a reading on Pier 39—I need you to move bloc A and bloc B to that location so we can drown them out,’” recalled another former official. “So they’d move these groups around to prevent any protests along the Embarcadero.”

“We got pissed off,” said the same former intelligence official, because the Chinese “were interfering with the free expression of opinion” at the torch relay—their operation was, in essence, an effort by a hostile foreign intelligence service to forcibly suppress First Amendment activities in a major American city.

Disagreements between the FBI and the State Department, which counseled a more restrained approach, prevented U.S. intelligence personnel from interfering directly in Chinese activities during the torch run itself, said this former intel official. (The State Department said it does not comment on intelligence matters.) The same source noted that U.S. intelligence officials did, however, pass information about the torch run to their Australian counterparts—the torch was later scheduled to pass through Canberra—which denied visas to some of the Chinese intelligence officers responsible for the melee in San Francisco.

Chinese intelligence has long focused on surveilling, and attempting to control, Chinese nationals studying abroad. One well-documented mechanism for this effort has been the use of Chinese Students and Scholars Associations groups on university campuses. The connectivity between individual campus CSSAs and local Chinese diplomatic facilities varies. Some groups are unreceptive to the intercession or influence of Chinese government officials, but many consider themselves to be under the direct “guidance” of their local consulate or embassy, receiving funds from these institutions. “Intelligence officers in diplomatic facilities are the primary point of contact for students in CSSAs,” said one former official.

But some of these links between these student groups and Chinese officials are covert, and even coercive. In one case in the mid-2000s in the Midwest, a student affiliated with a CSSA reported another Chinese student’s contact with the FBI to an MSS officer operating under diplomatic cover in Chicago, said a former intelligence official. The student was quickly flown out of the country. And, roughly half a decade ago in the Bay Area, counterintelligence officials believed that a graduate student affiliated with the Berkeley CSSA was working for the MSS, and reporting on the activities of other Chinese students on campus, said another former official.

***

When it comes to economic espionage in particular, Chinese intelligence employs a more decentralized strategy than Russia does, former intelligence officials told me. China draws from a much larger population pool to achieve its objectives—using opportunistic businessmen, ardent nationalists, students, travelers and others alike. One former intelligence official likened China’s approach to an “Oklahoma land rush”—an attempt to grab as much targeted proprietary technology or IP as possible, as quickly as possible, through as many channels as possible.

Chinese intelligence also undertakes very intentional efforts to recruit insiders placed within organizations whose technologies they are interested in, said the same former intelligence official. “They are very good at softly recruiting people, and taking advantage of vulnerabilities”—including via threats—“and they are very patient in putting different parts of it together. We’ve seen them repeatedly save money and time that the U.S. spends on research and development.”

The July 2018 arrest of Silicon Valley-based Apple employee Xiaolang Zhang, who allegedly stole proprietary information about Apple’s self-driving car program to benefit his new employer, a China-based competitor, appears to fit this pattern. (Zhang was charged with theft of trade secrets and has not been accused of any espionage-related crimes. He maintains his innocence.)

The case of Walter Liew, a Bay Area local who was found guilty in 2014 of selling a highly valuable proprietary pigmentation formula owned by DuPont to a state-owned Chinese conglomerate, is a clearer example.

Liew was found guilty of violating the Economic Espionage Act,a landmark 1996 federal law that strengthened penalties for trade theft benefiting a foreign government. San Francisco has played an outsized role in cases involving this law. In fact, the first conviction under the act occurred in San Francisco, in 2006; as did the first sentencing under the law, in 2008; as did the first jury conviction—of Liew himself—in 2014. All three cases involved China.

The Chinese have pursued this strategy “brilliantly” for years, said Puckett. “They put all their efforts into espionage, and get everything for free.”

Chinese cyberespionage operations have also targeted a number of Silicon Valley-based technology giants. During a number of attacks, two former intelligence officials told me, Chinese intelligence immediately sought the files of U.S. companies’ legal counsel or other legal documentation, to access Foreign Intelligence Surveillance Act warrants or National Security Letters previously issued to these institutions. In other words, the paramount Chinese interest was finding out the extent of the U.S. officials’ knowledge about China’s own intelligence operatives—and in adjusting their behavior accordingly. “If in fact the person in question was Chinese intelligence,” said this former official, “they could then alter their approach.” This strategy began being observed during a hack of Google, said two former officials, that occurred about a decade ago.

While China and Russia demand the lion’s share of counterintelligence resources in the Bay Area, a number of friendly intelligence services are also active in Silicon Valley, said former intelligence officials. South Korea, according to one, has become “formidable” in the realm of economic espionage, with particular sophistication in cyberespionage. U.S. officials have had to issue “stern warnings” to South Korea to “stop hacking” within the United States, said this person. (The South Korean Embassy in Washington, D.C., did not respond to requests for comment.)

Israel is also active in the Bay Area—but it’s complicated. According to one former intelligence official, Israel has “a culture that facilitates and encourages acquisition of targeted companies”—in other words, it will use information it has gathered locally to cajole or incentivize private Israeli firms to purchase specific start-ups or other Silicon Valley-based tech companies. Throughout the 2000s, said former officials, French intelligence employed a similar strategy.

In an email response, a spokesperson for the Israeli Embassy in Washington, D.C., wrote that “the allegations are totally untrue and downright ridiculous. Israel does not conduct espionage in the United States.” A spokesperson for the French Embassy declined to comment.

There is disagreement, however, within the U.S. intelligence community about the amount of resources that should be devoted to what is, in essence, a “soft” form of spying by U.S. allies. “I get they try to get advantages from economic espionage,” said another former senior intelligence official, “but is French espionage worth that much emotional discharge, given what the Russians are up to?”

***

There’s another big challenge to doing counterintelligence work in the Bay Area, say these officials: getting the cooperation of local private-sector actors, especially in tech. Indeed, said former intelligence officials, not only do many cases of economic espionage not reach the prosecution stage here, they often go unreported entirely.

This has been a longstanding source of friction in the Valley. “The biggest problem we had—really, seriously—with a lot of these companies is that they wouldn’t prosecute,” said Larae Quy, the former Palo Alto-based FBI counterintelligence agent who retired in 2006. “They would have an employee sell technology to, say, the Russians or the Chinese, and rather than let their stockholders or investors know about it, they just let it walk. So, we’ve caught the guy, or we have information and we’d like to take it to the next level, and they don’t want to push it because of the bad press that gets out. It’s the most frustrating thing in the world.”

Silicon Valley firms continue to downplay, or outright conceal, the extent to which the theft of trade secrets and other acts of economic espionage occur, said multiple former officials. “Coming forward and saying you didn’t have controls in place—that totally impacts shareholder or investor value,” noted one former intelligence official. “Especially when you’re dealing with startups or mid-level companies that are looking for funding, that’s a big deal. You’re basically announcing to the world, especially if you’re potentially going forward with a public trial, that you were not able to protect your information.”

The open, start-up culture in the Bay Area has also complicated U.S. counterintelligence efforts, said former officials, because Russian and Chinese operatives have an easier time infiltrating organizations without any security systems or hierarchies in place. These services like penetrating young companies and start-ups, noted one former official, because “it’s always better to get in at ground floor” when seeking to pilfer valuable information or technology.

The exorbitant cost of living in Silicon Valley, however, means that opportunities for tech employees—and potential spies or co-optees—to “get in at the ground floor” are becoming increasingly uncommon. The tech industry, chasing talent and lower overheard, is now spread more widely across the country than ever before. And this diffusion will create new vulnerabilities. Consequently, places like Chapel Hill, North Carolina and Boulder, Colorado—both midsized cities with thriving tech industries—will likely see an uptick in counterintelligence cases. (One former intelligence official noted that the FBI’s office in Austin, Texas, has built up its counterintelligence capacities.)

But spies will never leave Silicon Valley. As the region’s global clout grows, so will its magnet-like attraction for the world’s spooks. As one former U.S. intelligence official put it, spies are pulled toward the Bay Area “like moths to the light.” And the region will help define the struggle for global preeminence—especially between the United States and China—for decades to come.

 

 

United Front, China’s Weapon Against the West/Allies

“United Front Work is an important magic weapon for the victory of the party’s cause.”
                                     – Xi Jinping, October 2017

Related reading: A Weapon Without War: China’s United Front Strategy

A Weapon Without War: China’s United Front Strategy ... photo

Senators Cruz and Rubio have been sounding the alarms on the Confucius Institution that has found homes on U.S. college campuses. They have both done the same with regard to the Chinese Students Association.

Australia, Taiwan, Japan, Taiwan and New Zealand are sounding the same warnings.

Xi Jinping’s rule to date has been characterised by, among other things, a return to the basics of Party rule as established by Mao. These include a renewed emphasis on United Front 统战 work, which Mao called one of the ‘three secret weapons’ 三个大法宝 (along with the armed forces and Party-building) that helped the Chinese Communist Party (CCP) to power in 1949. (For an overview of the United Front, see the China Story Yearbook 2014: Shared Destiny, pp.128–132.) The year 2015 was the most important one since 1990 for the United Front, a collection of strategies overseen by the United Front Work Department (UFWD) 统战部 by which the Party seeks to strengthen its authority and legitimacy, especially among the more marginalised, independent, and minority sectors of the Chinese population.

Explain the primary role of the United Front Work in the Chinese Communist Party (CCP).

The United Front Work Department of the CCP is an integral part of the Party structure, down to sometimes the lowest levels and coordinated at the very top by a United Front Leading Small Group initiated by Xi Jinping. The Department works to reach out, represent, and guide key individuals and groups within both the PRC [People’s Republic of China] and greater China, including Chinese diasporas. The goals include to have all such groups accept CCP rule, endorse its legitimacy, and help achieve key Party aims. Because United Front Work has officially been extended to those who emigrated after 1979 as well as those Chinese studying abroad, some 50 million or more, United Front Work is now of direct relevance and sometimes concern to an increasing number of foreign governments, notably Australia, Zealand, Canada and the United States. United Front Work abroad is not limited to only these countries though.

Related reading: China Built an Army of Influence Agents in the U.S.

How does the United Front Work fashion China’s image and influence overseas?    

An important role of United Front Work since Xi Jinping became CCP general secretary in 2012 has been to help tell the CCP’s preferred “China story” by encouraging overseas Chinese of all sorts to become active promoters of the Party-state’s views in their own domiciles. This promotion includes using material from China in publications, forming associations to highlight positions on issues like Taiwan or more recently, the One Belt, One Road policy, meeting local politicians and winning them over, and using the status of voters in democracies to influence domestic policies in ways that promote CCP interests.

The promotion of Confucius Institutes to win greater influence over what and how Chinese is taught has been yet another success story, particularly in the developing world where this initiative allows Party-state views much more leeway.

Encouraging all of sorts of influential foreigners to visit China under supervision has also been a very successful tactic. Such visitors are treated lavishly and often come to modify their positions or end up airing official Chinese positions despite themselves. Even retired politicians are seen as valuable because of their institutional knowledge and the assumption, usually valid, that they can still wield significant influence in their party or more broadly.

Explain the function of CCP propaganda machinery in Chinese foreign policy.  

The current CCP propaganda push abroad can be summed up as helping ‘make the international environment safe for achieving the Party-state’s goals’ and shifting the terms of discussion of China to ones that the CCP prefers. Even forcing or achieving small shifts in language can be very significant.

The recent attacks on Marriott Hotels and foreign airlines for using terms such as Taiwan and thus treating Taiwan as an independent country have been rewarded with immediate backtracking by the companies concerned. The result of these efforts is to help isolate and delegitimize Taiwan’s status in the eyes of foreign publics. Note that these effects are the opposite of how the CCP uses United Front Work and propaganda in regards to itself, but isolation and delegitimization or at least neutralization of real and perceived enemies are important goals of both. The success of these efforts would be to reduce the costs of other actions intended to bring Taiwan under PRC sovereignty, such as boycotts, blockades, or even invasion.

The CCP would emphasize any such actions as merely “internal” affairs. This “legitimacy” would be repeated by innumerable Chinese diaspora groups around the world, not least by the Associations for the Peaceful Reunification of China – run out of Beijing but now spread worldwide. Even the translation from Chinese of tongyi or “unification” as “reunification” is an effective almost subliminal technique of reframing the issue in the CCP’s favor. Another salient example of the success of these techniques is how foreign news organizations and broadcasters now often feel the need to add a rider to any discussions of Taiwan, adding, “which China regards as a renegade province.” It might be true at one level, but is deeply wrong and misleading at another.

Why are Chinese influence efforts increasingly under government scrutiny in Australia?

The CCP’s United Front Work and stepped up propaganda activities in Australia have been only belatedly recognized as potentially dangerous at a number of levels. These include the emergence of a new group of wealthy Chinese who, having made their fortunes in China, were seeking political access and influence in Australia. The major problem has been with the sometimes very strong United Front links of such people and hence the motives of their actions were called into question. The influence of some of these people on Chinese media in Australia, now almost overwhelmingly pro-Beijing, was another worry as it left only a few independent voices speaking directly to Chinese communities in Chinese and promoting values not in line with Beijing’s.

Another concern has been around fears of stepped up activities and surveillance of Chinese students on Australian campuses. This followed the formalization of PRC students abroad as a specific united front work target in 2015 and a number of well publicized incidents where Chinese students had confronted lecturers about, for example, treating Taiwan as a country.

While much of this work with students and post graduates is likely aimed at surveillance to ascertain whether students are being attracted to Western ideals and values, Christianity, or Falun Gong, the potential clearly exists to push universities or teachers to tone down or omit courses which teach things the CCP regards as dangerous or subversive. Similarly, there are recurrent concerns that the Confucius Institutes on university campuses may pose dangers to academic freedom and promote pro-Beijing lines.

Perhaps the latest and largely unspoken concern relates to a growing realization that the dramatic increases in Chinese emigration to places like Australia and New Zealand etc., particularly since the 2000s, have given rise to large groups of citizens with voting power and sometimes able to sway even general elections, who often remain largely under the sway of the PRC Party-state via its propaganda and United Front Work. Having left China as beneficiaries of the reform period, these groups have no reason to oppose it and many good reasons to support it even if they had no vote there. This is very different, for example, from those who migrated or fled in the wake of the brutal suppression of the student movement of 1989. Moreover, these new migrants are often highly educated and economically successful, unlike many of the generations of Chinese before them, and hence much more able and likely to demand commensurate influence more or less immediately. There is no need for a transitional generation to build up such social, political, and economic capital. This unforeseen consequence of business and student migration is only now becoming obvious to local politicians but how to respond is unclear.

Russia’s Operations Against the US Explained at Aspen Security Forum

Associated Press

Published on Jul 18, 2018
(19 Jul 2018) FBI Director Christopher Wray says Russia is trying to influence opinions and sow discord and divisiveness in the U.S. Wray spoke at the opening event of the Aspen Security Forum in Colorado. (July 19)

Meanwhile, there has been substantial theories and responses due to Special Counsel Robert Mueller’s indictment of the 13 Russians from February. 

Add in the second round of 12 Russians that SC Mueller indicted just this month. So we are currently at 25. Now, consider Ms. Maria Butina who was arrested last Sunday.

Butina, 29, was indicted by a grand jury Tuesday on charges she served in the United States as an agent of the Russian government without notifying the Justice Department. In the court filing Wednesday, prosecutors said Butina maintained constant contact with Russian intelligence officials and “loyally” carried out a years-long conspiracy to advance the Kremlin’s interests. They described her plan as “calculated, patient” and directed by a Russian official believed to be Alexander Torshin, who was sanctioned by the Treasury Department earlier this year.

Perhaps, one should consider that Mueller is for sure simply trying to clean up a Russian mess left behind by the Obama administration. All of this happened during his administration. For an exceptional summary on the matter of Butina and what FBi Director is referring to at the Aspen Security Forum, click this link.

Security agency professionals are in attendance at the Aspen Security Forum to include DHS Secretary Kirstjen Nielsen, Daniel Coats, Director of National lntelligence, Rod Rosenstein, Deputy Attorney General and Christopher Wray, Director of the FBl.

Further, there are real concerns that the Federal and State governments are not doing enough to protect whole election architecture and systems. That is a false assertion by the Democrats as there have been hearings on the Hill explaining the work/collaboration between DHS and individual states. Admittedly, there are issues at the State level where databases, computers, voter rolls and more all take place. The bell first rang on state vulnerabilities began in the 2016 general election, where the cyber professionals at the FBl were placed in states known to be under brute force cyber attacks. State officials were warned then and provided advice on how to harden their respective systems going forward.

Those discussions and activities continue today including at the Aspen Security Forum.  A specific session is dedicated to this issue as noted:

Defending Democratic Institutions: Election 2018 and Beyond
Though the motivation and the effects are disputed, nearly everyone agrees that Russia interfered in the 2016 presidential election, and security experts agree that it is already interfering in this year’s mid-terms. Though efforts are underway to stop them, what more can be done to put an end to Russia’s interference in our elections and democratic institutions?

Monika Bickert, Head of Product Policy and Counterterrorism, Facebook
Tom Burt, Corporate Vice President for Customer Security and Trust , Microsoft
Michael Chertoff, Former Secretary of Homeland Security
Jeanette Manfra, Assistant Secretary of Homeland Security for Cybersecurity and
Communications
Kim Wyman, Secretary of State, Washington State
Moderator: Michael Isikoff, Chief Investigative Correspondent, Yahoo News

 

Meanwhile, Senator Rubio introduced legislation last year to further add sanctions on Russia due to Russian interference. Due to the most recent political scandals, some noted above, Rubio’s bill is getting renewed attention and support in Congress.

Image result for rubio deter act photo

Briefly from the Miami Herald:

Rubio and Van Hollen’s bill, called the Defending Elections from Threats by Establishing Redlines (DETER) Act, is the first bill since the 2016 presidential election that sets specific punishments for the Russian government and other countries that interfere in U.S. political campaigns.

“Congress has already taken various steps when it comes to Russia and its interference in 2016, this will just be one moving forward that hopefully would deter future attacks, which I believe is the real threat here ultimately,” Rubio said on Tuesday. “It’s not what happened, but what could happen in the future. Hopefully we’ll get to a critical mass and momentum that we can get going on it and get it passed.”

Rubio’s bill, if passed, codifies specific penalties for the Russians that must be implemented within 10 days if the Director of National Intelligence determines that interference took place.

The penalties include “sanctions on major sectors of the Russian economy, including finance, energy, defense, and metals and mining” and blacklisting every senior Russian political figure or oligarch identified in the Russian sanctions bill that became law in 2017 over the initial objections of Trump after a supermajority in Congress approved it.

The bill lays out specific acts by foreign governments that constitute election interference. Foreign governments are forbidden from purchasing advertisements to influence elections, using social and traditional media to spread “significant amounts” of false information, hacking election or campaign infrastructure such as voter registration databases and campaign emails, and blocking access to elections infrastructure such as websites that provide information on polling locations. Read more here.

 

Smart TV’s vs. Your Privacy

It is all getting quite tiresome.It is a cyber war you are in and you don’t know it.

There is Facebook sharing your data with foreign entities and governments. Then the NSA announced it was deleting 685 million personal records.

Then it was Siri and Alexa. Then we are told that Google is reading your GMail. And Google defends the practice.

Smart TVs are spying on you

If you watch television on an internet-connected TV, it may be watching you back.
Data-slurpers: The New York Times took a close look at the rise of services that track viewers’ watching habits—in particular Samba TV, which has claimed to gather second-by-second information from software on 13.5 million smart TVs in the US, this includes brand like smart TV Samsung, LG and Samba
Been here before: Last year, the Federal Trade Commission fined Vizio for $2.2 million over a similar issue. But that was because Vizio sold its data to third parties without users’ consent. Samba pays TV manufacturers like Sony and Philips to carry its software, but doesn’t sell its data. Instead, Samba uses it to sell targeted ads.
Why it matters: You may rip your TV’s plug out of the wall in horror. Or you may not care (Samba TV has said that 90 percent of users agree to turn the service on). Either way, this kind of thing could be going on in your living room—and the companies behind it aren’t exactly going out of their way to let you know about it.

What is a Smart TV?  photo

*** The New York Times was not the most recent reporting of this. In fact several media outlets sounded the alarm back in 2017.

The Federal Trade Commission said Monday that Vizio used 11 million televisions to spy on its customers. The television maker agreed to pay $2.2 million to settle a case with the FTC and the New Jersey attorney general’s office after the agencies accused it of secretly collecting — and selling — data about its customers’ locations, demographics and viewing habits.

With the advent of “smart” appliances, customers and consumer advocates have raised concerns about whether the devices could be sending sensitive information back to their manufacturers. The FTC says the Vizio case shows how a television or other appliance might be telling companies more than their owners are willing to share.

“Before a company pulls up a chair next to you and starts taking careful notes on everything you watch (and then shares it with its partners), it should ask if that’s O.K. with you,” Kevin Moriarty, an attorney with the FTC’s Division of Privacy and Identity Protection, wrote in a blog post. “Vizio wasn’t doing that, and the FTC stepped in.”

As part of the settlement, Vizio neither confirmed nor denied wrongdoing.

“Today, the FTC has made clear that all smart-TV makers should get people’s consent before collecting and sharing television viewing information, and Vizio now is leading the way,” Vizio’s general counsel, Jerry Huang, said of the settlement.

Although some consumers might not recognize the name Vizio, most have probably watched something on a Vizio television. The Irvine, Calif.-based firm, which Chinese firm LeEco recently announced it would buy, is the most popular TV maker in the United States. With 20 percent of the U.S. market, it made about 1 in 5 TVs sold here in 2016. LeEco has broad ambitions in the consumer space, with businesses that also produce a Netflix-style media service, smartphones and even cars.

According to the lawsuit, Vizio was literally watching its watchers — capturing “second-by-second information” about what people viewed on its smart TVs. That included data from cable, broadband, set-top boxes, over-the-air broadcasts, DVDs and streaming devices. Vizio also is accused of linking demographic information to the data and selling the data — including users’ sex, age and income — to companies that do targeted advertising.

Vizio said in its statement that it never paired viewing information with data that identified individual users but used viewing data only in “the ‘aggregate’ to create summary reports measuring viewing audiences or behaviors.”

The U.S. District Court for the District of New Jersey ordered Vizio to pay $1.5 million to the FTC and $1 million to the New Jersey attorney general’s office; Vizio won’t have to pay $300,000 of that unless it violates the order in the future.

The part of the settlement paid to the FTC reflects the amount that Vizio probably made from collecting and selling the customer information. Vizio will delete all the data it collected through the feature before March 2016. It must also prominently display its data collection and privacy policies to consumers and create a program to make sure its partners follow those policies.

Question China and They Were Uninvited to RIMPAC

The U.S. Navy and allies are drilling in the Pacific Ocean as part of the massive Rim of the Pacific naval exercise. After years continuing to sail alongside China in RIMPAC, even as the peer competitor militarized man-made islands in the South China Sea, the U.S. decided enough is enough and rescinded the invitation. (Andrew Jarocki/Staff)

Twenty-six nations, 47 surface ships, five submarines, 18 national land forces, and more than 200 aircraft and 25,000 personnel will participate in the biennial Rim of the Pacific (RIMPAC) exercise scheduled June 27 to Aug. 2, in and around the Hawaiian Islands and Southern California. As the world’s largest international maritime exercise, RIMPAC provides a unique training opportunity designed to foster and sustain cooperative relationships that are critical to ensuring the safety of sea lanes and security on the world’s interconnected oceans. RIMPAC 2018 is the 26th exercise in the series that began in 1971. The theme of RIMPAC 2018 is “Capable, Adaptive, Partners.” Participating nations and forces will exercise a wide range of capabilities and demonstrate the inherent flexibility of maritime forces. These capabilities range from disaster relief and maritime security operations to sea control and complex warfighting. The relevant, realistic training program includes amphibious operations, gunnery, missile, anti-submarine and air defense exercises, as well as counter-piracy operations, mine clearance operations, explosive ordnance disposal, and diving and salvage operations. This year’s exercise includes forces from Australia, Brazil, Brunei, Canada, Chile, Colombia, France, Germany, India, Indonesia, Israel, Japan, Malaysia, Mexico, Netherlands, New Zealand, Peru, the Republic of Korea, the Republic of the Philippines, Singapore, Sri Lanka, Thailand, Tonga, the United Kingdom, the United States and Vietnam. This is the first time Brazil, Israel, Sri Lanka and Vietnam are participating in RIMPAC. Additional firsts include New Zealand serving as sea combat commander and Chile serving as combined force maritime component commander. This is the first time a non-founding RIMPAC nation (Chile) will hold a component commander leadership position. This year will also feature live firing of a Long Range Anti-Ship Missile (LRASM) from a U.S. Air Force aircraft, surface to ship missiles by the Japan Ground Self-Defense Force, and a Naval Strike Missile (NSM) from a launcher on the back of a Palletized Load System (PLS) by the U.S. Army. This marks the first time a land based unit will participate in the live fire event during RIMPAC. RIMPAC 18 will also include international band engagements and highlight fleet innovation during an Innovation Fair. Additionally, for the first time since RIMPAC 2002, U.S. 3rd Fleet’s Command Center will relocate from San Diego to Pearl Harbor to support command and control of all 3rd Fleet forces in 3rd Fleet’s area of responsibility to include forces operating forward in the Western Pacific. The Fleet Command Center will be established at a deployable joint command and control on Hospital Point for the first part of the exercise and then transition to USS Portland (LPD 27) for the remainder of the exercise. Hosted by Commander, U.S. Pacific Fleet, RIMPAC 2018 will be led by Commander, U.S. 3rd Fleet, Vice Adm. John D. Alexander, who will serve as combined task force (CTF) commander. Royal Canadian Navy Rear Adm. Bob Auchterlonie will serve as CTF deputy commander, and Japan Maritime Self-Defense Force Rear Adm. Hideyuki Oban as CTF vice commander. Fleet Marine Force will be led by U.S. Marine Corps Brig. Gen. Mark Hashimoto. Other key leaders of the multinational force will include Commodore Pablo Niemann of Armada de Chile, who will command the maritime component, and Air Commodore Craig Heap of the Royal Australian Air Force, who will command the air component. This robust constellation of allies and partners support sustained and favorable regional balances of power that safeguard security, prosperity and the free and open international order. RIMPAC 2018 contributes to the increased lethality, resiliency and agility needed by the joint and combined force to deter and defeat aggression by major powers across all domains and levels of conflict.

***

The location of the garrison, confirmed through satellite imagery here, can possibly support a brigade-sized intercontinental ballistic missile formation.

New Delhi: China has built a new garrison in its central Sichuan province for its intercontinental ballistic missiles (ICBM) which have the capacity to cover all of India, the Indian Ocean Region as well as large parts of continental America.

On 27 May, the 10th test of the Dongfeng-41 or DF-41 (East Wind-41) ICBM, with a reported range of 12,000-15,000 km, was conducted at the Taiyuan Space Launch Center in Shanxi province. China’s PLARF, or the People’s Liberation Army Rocket Force, formerly Second Artillery Corps (SAC), claimed it a success.

Vinayak Bhat/The Print

ThePrint has now identified a never-before revealed PLARF location, which may possibly be a DF-41 garrison, with the help of satellite imagery.

ThePrint had in April reported that PLARF had built a garrison in the southernmost Hainan province to store DF-31AG missile.

The location

This is the first time that the new Chinese garrison has been confirmed through satellite imagery (as of 7 May, 2018), although it has been covered by ground human intelligence before.

It is located 15 km east of Yibin town in Sichuan province, away from towns and cities but close to a highway to enable quick deployment. Construction is said to have begun three years ago.

The entire complex can possibly support a brigade-sized ballistic missile formation.

The ICBM is likely to be armed with 10 multiple independently targetable re-entry vehicle (MIRV) warheads each with 150kT yield.

Vinayak Bhat/The Print

This new garrison is typically built around a sports track with a football field in it. It also has two basketball grounds and an obstacle course adjoining the sports track.

There are two large highbay garages in the centre of the complex along with two smaller highway garages to the north of the facility. The smaller highbay garages were probably built for warhead assembly.

There are two locations where dugouts are observed. These could possibly be underground DES igloos.

Vinayak Bhat/The Print

There are about 15 triple storied C-shaped barracks, possibly for troops’ living accommodations.

Three large multi-storey buildings connected with each other could be administrative offices. A meteorological station with possible satellite link is also seen to the west side of the complex.

All buildings except central administrative buildings and high-bay garages are provided with slanted box gable roofs.

Vinayak Bhat/The Print

The entire garrison with its support buildings has a very high-walled security with four entrances. The main entrance is heavily guarded with around 200m approach under visual observation with the help of a large convex mirror.

It has typical layout of eight garages with six of them being interconnected. There are 30 smaller buildings (15 on either side of highbay garages) with different dimensions which are difficult to assess.

In the latest satellite image, a large tractor trailer of 22m is seen plying on the highway 400 metre south of the complex, suggesting that DF-41 truck erector launcher (TEL) of similar size can easily manoeuvre in this area.

The vehicle

 The DF-41 vehicle has most advanced technologies incorporated for the smooth ride of the missile. It is an eight-axle, 16-wheeled TEL with possibly a six-axle drive.

The steering mechanism of DF-41 TEL is very uniquely purposed to provide high-speed turning stability and smallest possible turning radius to the behemoth.

Power steering has been provided on the three-front steer axles and the rear three drive axles are probably mechanically coordinated with hydraulic power. Thus making the DF-41 TEL very easily manoeuvrable.

As for the 27 May ICBM test from the Taiyuan Space Launch Centre, it was first reported by Washington Free Beacon quoting Pentagon spokesman Marine Corps Lt. Col. Christopher Logan who said, “The US was aware of recent flight tests and we continue to monitor weapons development in China.”

The well-known defence magazine IHS Jane’s Defence Weekly claimed that after the latest launch, DF-41 had moved closer to commissioning and deployment. Chinese experts claim that DF-41 is the most advanced ICBM in the world.