Chinese Slaves Manufacture Covid Masks Your Wearing

By: Denise Simon | Founders Code

So, we are continuing to learn only some of the actions inside the United States by the Chinese Communist Party that include:

    • Senator Dianne Feinstein and her husband
    • The entire Biden Family
    • Congressman Eric Swalwell

… we are now finding that Georgia Senate candidate, Jon Ossoff in a contentious run-off race, lied about his Chinese Communist Party business deal and finally came clean after he was about to be sued over his false financial disclosures.

Ossoff attracting surprising levels of GOP support in Georgia special - POLITICO

There is much more to bubble to the surface as noted by the shuttering of the Chinese Consulate in Houston a few months ago and the soon to be revealing of more details. Meanwhile, U.S. corporations are also closely tied to the Chinese Communist Party least of which is Apple, Google, and Facebook. But what about slaves?

Few people understand that China has re-education camps and slaves known as Uighurs and the treatment of this Turkic ethnic group which is native to China.

A very large and detailed investigation completed is noted below:

Medical masks and protective equipment made by Uighur laborers in China are being sold across Europe by at least two major distributors, and have been bought by governments and health bodies in at least five countries, an investigation by OCCRP and partners has found.

The workers are ethnic Uighurs from the western Chinese region of Xinjiang who have been sent to factories in other parts of the country under a controversial “labor transfer” program that experts say is coercive and prone to abuses.

China’s government has embarked on a campaign to stamp out unrest among Uighurs in Xinjiang via a campaign of mass surveillance and detention.

The labor transfer program ostensibly provides Uighurs in Xinjiang with new opportunities to leave home for factory jobs in other provinces. But rights workers say they are often coerced into complying, amid a crackdown that has seen over a million Uighurs and other Muslim minorities sent to re-education camps. Campaigners have been pushing for Western companies and governments to stop buying products made with Uighur labor.

Earlier this year, the New York Times revealed that medical masks made by Uighurs at a factory in Hubei province were being sold in the U.S. Now, OCCRP and its partners have found that some of Europe’s biggest medical distributors are also selling masks and protective equipment from this manufacturer, Hubei Haixin Protective Products. Publicly available documents show that Hubei Haixin until recently employed at least 130 Uighur workers transferred from Xinjiang.

The distributors include local branches of McKesson, a multinational giant that owns some of Europe’s largest pharmacy chains and medical wholesalers, and Swedish medical supply firm OneMed, which sold masks to health authorities and national stockpiles across the Nordic and Baltic regions.

Both McKesson and OneMed continued selling Hubei Haixin products throughout 2020, even after the Chinese company was named earlier this year by the New York Times and a think tank, the Australian Strategic Policy Institute (ASPI), as using potentially forced labor by Uighurs.

Reporters also found McKesson and OneMed sold products made by Zhende Medical, a publicly traded Chinese company that has been flagged as risky by rights experts because it has supply chains and subsidiaries in Xinjiang.

In a brief response sent to reporters, McKesson Europe’s public affairs director, Ronan Brett, said: “McKesson Europe is committed to good corporate citizenship and ethical sourcing. Suppliers must agree to McKesson Sustainable Supply Chain Principles (MSSP) which covers compliance with appropriate laws along with adherence to our strict policies on protecting workers, preparing for emergencies, identifying and managing environmental risk, and protecting the environment.” He did not respond to a request for further comment.


Credit: Henrik Myhr Nielsen / NRK Norwegian Prime Minister Erna Solberg welcomes a shipment of protective equipment by OneMed on March 23, 2020. The shipment included goods from Hubei Haixin. 

OneMed’s head of operations, Robert Schmidt, said the company found out in late 2019 that the Hubei Haixin factory employed workers from Xinjiang, but continued its relationship with the producer after finding no evidence they were being coerced or mistreated.

“OneMed’s overall assessment is that there is no forced labor or discrimination against the Uighur minority population in our supply chain,” he said. “But we will of course continue to follow the issue and act if we should receive any new information.”

According to documents obtained by reporters, OneMed contacted Hubei Haixin with concerns about Uighur workers in January, and the Chinese factory promised to return them to their homes in Xinjiang at the end of their contract in March. But in reality, the factory continued to employ them until this September, claiming that pandemic movement restrictions prevented the workers from going home. OneMed continued buying the products.

Neither Hubei Haixin nor Zhende Medical responded to requests for comment, but in a statement sent to one of its European distributors, and obtained by reporters, Zhende said, “It is not acceptable in Zhende to engage in or support the use of forced or compulsory labor.”

“The so-called ‘human rights abuses’ in Xinjiang or ‘persecution of ethnic minorities’ are lies of the century made up by extremist anti-China forces,” a representative of the Chinese Embassy in Oslo, Yang Yiding, wrote in a statement to reporters.

China’s Foreign Ministry did not respond to requests for comment.

Credit: Matteo Civillini Hubei Haixin masks ordered from LloydsPharmacy Italy bear the name of McKesson Global Sourcing Ltd, a U.K. subsidiary of McKesson. 

“Violation of Virtually Any Kind of Ethical Policy”

Over a million Uighurs and other Muslim minorities are believed to have been detained in newly built detention camps in recent years. China describes the camps as re-education facilities intended to combat Islamic radicalism, following a series of deadly inter-ethnic riots in Xinjiang and attacks by Uighur militants on ethnic-majority Han throughout China.

Uighurs have been documented working both in factories within Xinjiang’s detention camps, as well as being sent to regular factories throughout China via labor transfer programs, which are billed as a way of alleviating poverty and countering religious extremism.

It is important to keep reading the full summary found here.


China Used ‘Mass Surveillance’ On Thousands Of Americans’ Phones

By: Denise Simon | Founders Code

Is the Caribbean Smartphone Market Closer to Asia than America? - Droid  Island

Newsweek reports: A mobile security expert has accused China of exploiting cellphone networks in the Caribbean to conduct “mass surveillance” on Americans.

China Regional Snapshot: The Caribbean - Committee on Foreign Affairs

Gary Miller, a former vice president of network security at California-based analytics company Mobileum, told The Guardian he had amassed evidence of espionage conducted via “decades-old vulnerabilities” in the global telecommunications system.

While not explicitly mentioned in the report, the claims appear to be centered around Signaling System 7 (SS7), a communications protocol that routes calls and data around the world and has long been known to have inherent security weaknesses.

According to Miller, his analysis of “signals data” from the Caribbean has shown China was using a state-controlled mobile operator to “target, track, and intercept phone communications of U.S. phone subscribers,” The Guardian reported.

Miller claimed China appeared to exploit Caribbean operators to conduct surveillance on Americans as they were traveling, alleging that attacks on cell phones between 2018 to 2020 likely affected “tens of thousands” of U.S. mobile users in the region.

“Once you get into the tens of thousands, the attacks qualify as mass surveillance,” the mobile researcher said, noting the tactic is “primarily for intelligence collection and not necessarily targeting high-profile targets.” Miller continued: “It might be that there are locations of interest, and these occur primarily while people are abroad.”

A previous analysis paper covering 2018-2019, also titled Far From Home, contained a series of similar espionage claims about SS7, alleging that “mass surveillance attacks” in 2018 were most prevalent by China and Caribbean mobile networks. More here.

But hold on… it does not stop there… we also have the Channel Islands…

Pin on Guernsey Island

Remarkable investigative details here.

The Bureau: Private intelligence companies are using phone networks based in the Channel Islands to enable surveillance operations to be carried out against people around the world, including British and US citizens, the Bureau of Investigative Journalism can reveal following a joint reporting project with the Guardian.

Leaked data, documents, and interviews with industry insiders who have access to sensitive information suggest that systemic weaknesses in the global telecoms infrastructure, and a particular vulnerability in Jersey and Guernsey, are being exploited by corporate spy businesses.

These businesses take advantage of some of the ways mobile phone networks across the world interact in order to access private information on targets, such as location information or, in more sophisticated applications, the content of calls and messages or other highly sensitive data.

The spy companies see phone operators in the Channel Islands as an especially soft route into the UK, according to industry experts, who say the attacks emanating from the islands appear to be targeted at individuals rather than cases of “mass” surveillance. The Bureau understands that the targets of this surveillance have been spread across the globe, and included US citizens as well as people in Europe and Africa.

Ron Wyden, the Oregon senator and privacy advocate, described the use of foreign telecom assets to spy on people in the US as a national security threat.

“Access into US telephone networks is a privilege,” he said in response to the Bureau’s findings. “Foreign telecom regulators need to police their domestic industry – if they don’t, they risk their country being cut off from US roaming agreements.”

Markéta Gregorová, the European Parliament’s chief negotiator on trade legislation for surveillance technology, called for “immediate regulatory, financial and diplomatic costs on companies and rogue jurisdictions” that enabled these practices.

“Any commercial or governmental entity, foreign or domestic which enables the facilitation of warrantless cyber-attacks on European citizens deserves the full force of our justice system,” she told the Bureau.


Stop Using Zoom, Second Warning

By: Denise Simon | Founders Code

The first warning came last March.

March: As remote work surges amid the coronavirus pandemic, the FBI issued a public bulletin Monday warning Zoom and other video teleconferencing services may not be as private, or as secure, as users may assume.

Use of Zoom and similar services has exploded in recent weeks as companies, schools, governments, and individuals increasingly turn to its teleconferencing as ways to keep businesses and classrooms afloat while sheltering in pace or working from home. However, the shift also represents an opportunity for attackers, as white supremacists, hackers and other trolls barge into digital meetings, a phenomenon known as “Zoombombing.”

In Massachusetts, there have been several incidents, including an unintended participant joining a high school’s virtual classroom only to yell profanities and reveal personal information about the teacher, according to the FBI. Another unwelcome participant with swastika tattoos joined a separate Massachusetts school’s Zoom meeting, the FBI reports.

“The FBI has received multiple reports of conferences being disrupted by pornographic and/or hate images and threatening language,” the FBI cautioned. “As individuals continue the transition to online lessons and meetings, the FBI recommends exercising due diligence and caution in your cybersecurity efforts.”

It’s not just private businesses and children whose meetings could be Zoombombed. Privacy and security issues in conferencing software may also pose risks to national security, as world leaders convene Zoom meetings. In some cases, world leaders such as U.K. Prime Minister Boris Johnson have shared screenshots of their teleconferencing publicly only to reveal Zoom meeting IDs, raising concerns that sensitive information could be compromised. More here.

Stupidly, government officials at all levels are using Zoom including the Biden presidential team. How dangerous is that? Those officials are not reading the warnings or the news? Yeesh.

Zoom Biden Rally

For more proof, again this month…

Justice Department/December 2020: China-Based Executive at U.S. Telecommunications Company Charged with Disrupting Video Meetings

It is not only the U.S. that is sounding the warnings. The Telegraph reports warnings that “opportunistic criminals” (a formulation that’s practically redundant), can be expected to use bogus invitations to sessions in their social engineering efforts.

Connecticut Teen Arrested for Allegedly 'Zoom Bombing ...

A security executive with the video-tech giant Zoom worked with the Chinese government to terminate Americans’ accounts and disrupt video calls about the 1989 massacre of pro-democracy activists in Tiananmen Square, Justice Department prosecutors said Friday.

The case is a stunning blow for Zoom, one of the most popular new titans of American tech, which during the pandemic became one of the main ways people work, socialize and share ideas around the world. The California-based company is now worth more than $100 billion.

But the executive’s work with the Chinese government, as alleged by FBI agents in a criminal complaint unsealed Friday in a Brooklyn federal court, highlights the often-hidden threats of censorship on a forum promoted as a platform for free speech. It also raises questions about how Zoom is protecting users’ data from governments that seek to surveil and suppress people inside their borders and abroad.

Prosecutors said the China-based executive, Xinjiang Jin, worked as Zoom’s primary liaison with Chinese law enforcement and intelligence services, sharing user information and terminating video calls at the Chinese government’s request.

Jin monitored Zoom’s video system for discussions of political and religious topics deemed unacceptable by China’s ruling Communist Party, the complaint states, and he gave government officials the names, email addresses, and other sensitive information of users, even those outside China.

Jin worked also to end at least four video meetings in May and June, including video memorial calls with U.S.-based dissidents who’d survived the crackdown by Chinese military forces that killed thousands of students and protesters. The Chinese government works to censor any acknowledgment of the massacre, including on social media outside China.

A Zoom spokesperson said in a statement Friday that the company has cooperated with the case and launched its own internal investigation. Jin, the company said, shared “a limited amount of individual user data with Chinese authorities,” as well as data on no more than 10 users based outside China. Jin was fired for violating company policies, the statement said, and other employees have been placed on administrative leave until the investigation is complete.

In an updated statement on Zoom’s website, the company said it “fell short” by terminating the meetings instead of only blocking access to participants in China, to abide by Chinese law. The company said it has reinstated the victims’ accounts and will no longer allow requests from the Chinese government to affect users outside mainland China.

“As the DOJ makes clear, every American company, including Zoom and our industry peers, faces challenges when doing business in China,” the company said in its statement. “We will continue to act aggressively to anticipate and combat ever-evolving data security challenges.”

Jin could not be reached for comment. Though Jin lives in China and is not in U.S. custody, officials said he could be transferred to the United States to face prosecution if he travels to a country that has an extradition treaty with the U.S.

A spokesperson for the Chinese embassy in Washington did not respond to requests for comment.

Human-rights activists this summer said their Zoom accounts had been abruptly terminated shortly before or after they’d hosted video calls commemorating the 31st anniversary of the Tiananmen Square protests, a bloody crackdown captured in the iconic photo of a man standing in front of a Chinese tank.

Zoom said in a statement then that the company “must comply with laws in the countries where we operate.” While the company said it regretted “that a few recent meetings with participants both inside and outside of China were negatively impacted,” the statement said it was not in the company’s power “to change the laws of governments opposed to free speech.”

Zhou Fengsuo, a student leader during the Tiananmen Square protests who had his paid Zoom account terminated this summer, told The Washington Post on Friday that he had worked with the FBI on the case and saw the charges as “tremendous news.”

“It’s so eye-opening to me how this U.S. company, having this connection, would report directly to” the Chinese Communist Party and “disrupt our meetings regularly on behalf of the CCP,” he said. “This executive was working for the government and police as an agent of persecution, and Zoom was paying this guy for doing that job.”

Prosecutors charged Jin, also known as Julien Jin, with conspiracy to commit interstate harassment and to transfer a means of identification. Jin, 39, had worked at the company since 2016, most recently as a “Security Technical Leader,” the complaint said.

Quoting from electronic messages between Jin and other Zoom employees, FBI agents outlined a months-long, high-pressure campaign by China’s “Internet Police” to view users’ video calls and suppress unwanted speech. In one April message, Jin said he had been summoned to a meeting with Chinese government officials who demanded that Zoom develop the capability to terminate any “illegal meeting” within one minute. In others, Jin sent meeting passwords and other sensitive internal data directly to Chinese law enforcement.

In the complaint, FBI agents said that Zoom employees in the U.S. had agreed to a Chinese government “rectification” plan that entailed migrating data on roughly 1 million users from the U.S. to China, thereby subjecting it to Chinese law. Zoom also agreed, the complaint states, to provide “special access” to Chinese law enforcement and national security authorities. In one message cited in the complaint, Jin wrote that the authorities had wanted him to share detailed lists of the company’s “daily monitoring” of “Hong Kong demonstrations, illegal religions” and other subjects.

To terminate the Tiananmen Square calls, the complaint alleges, Jin’s co-conspirators fabricated evidence that they were intended to discuss child abuse, racism, terrorism, and violence. Jin’s co-conspirators also entered some calls with fake accounts that used pornographic or terrorist-related profile images, and Jin pointed to those images as evidence to terminate the meetings and suspend the hosts’ accounts.

John Demers, the assistant attorney general for national security, said the firm had, like many others that do business in China, put itself in a difficult position by operating in an authoritarian country whose laws and practices often “run antithetical to our values.”

“The company was focused on complying with Chinese law and the expectations of Chinese law enforcement,” Demers said. “But what happened over time is those expectations increased. So it goes from, ‘Well, respond to our lawful requests,’ to ‘You must take action within a minute to shut down any action on your platforms’ – not just in China, but outside – that hits upon topics of sensitivity to the Chinese government.”

That pressure, he noted, spans many industries: He cited the controversy last year involving the National Basketball Association, in which the general manager of the Houston Rockets tweeted in support of Hong Kong protesters, leading to a backlash in China.

“The case is an illustration of the choices that companies are forced to make when they do business in China . . . [and] how the Chinese government will take advantage of the leverage they have over you to push their agenda,” he said. “You’ve got a consistent pattern of the Chinese government using economic leverage – the opportunity to access markets, foreign investments – in order to further political goals.”

John Scott-Railton, a researcher at the Citizen Lab in Toronto, said the filing showed how authoritarian governments have increasingly looked at major tech companies as top-priority intelligence targets ripe for infiltration and recruitment.

He pointed to another case last year against two former Twitter employees charged with spying on behalf of Saudi Arabia, including by sending the personal information of thousands of people, including Saudi critics and prominent dissidents.

The charges were announced on the same day that the Trump administration added four Chinese companies to the Commerce Department entity list for enabling human rights abuses within China by providing DNA-testing materials or high-technology surveillance equipment to the Chinese government. They were among 59 Chinese companies Commerce add to its export control entity list, including companies that have been accused of stealing trade secrets and using U.S. exports to support the Chinese military.

Zoom has faced questions before about how it guards against the potential misuse of video data by the Chinese government, which censors major news and social media websites beneath what’s known as a “Great Firewall.”

This spring, Scott-Railton and another researcher found the company had routed American users’ data through Chinese servers, potentially opening it to Chinese-government data requests. The company later said it had “mistakenly” sent American video calls to Chinese data centers amid a flood of calls.

Zoom employs more than 2,500 people around the world, including, as of last year, more than 500 in China who develop the software installed in computers around the world.

The company’s billionaire chief executive, Eric Yuan, was born in China but moved to Silicon Valley in the late ’90s, where he worked for the video start-up WebEx before founding Zoom in 2011.

The Federal Trade Commission last month reached a settlement with Zoom, in which the company resolved allegations that it had misled users about their data privacy and encryption measures by agreeing to new security rules.

Questions over business dealings in China have become more commonplace as a new wave of Chinese tech start-ups has gained international popularity and acclaim. TikTok, the wildly popular short-video app owned by the Beijing-based tech company ByteDance, drew suspicions of censorship from users last year because searches on the site related to topics suppressed by the Chinese government, such as the Tiananmen Square massacre or the Hong Kong pro-democracy protests, showed few or no videos.

Internal guidelines for the site also mimicked Chinese-government censorship policies, and former employees for the company told The Post last year that key content-moderation decisions for international users were made in China. TikTok has said it has worked in recent months to distance its U.S. operations from the company’s Chinese headquarters.

Wang Dan, a Chinese dissident whose Zoom call on Tiananmen Square was also disrupted this spring, said the case showed how China could threaten free expression for people in the West.

“Interfering with the freedom of speech of those who have settled and lived in the United States in exile is . . . a serious attack to American sovereignty,” he told The Post on Friday. “The American people should also pay more attention to the [Chinese Communist Party’s] threat of American democracy.”


Pelosi Refusing to Advance China Task Force Legislation Items

By: Denise Simon | Founders Code


On September 25, 2015, during CCP General Secretary Xi’s state visit to the United States, President Obama and Xi gave remarks to the press in the White House Rose Garden. The two leaders announced that they had agreed “neither the U.S. nor the Chinese government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information for commercial advantage.” Xi also pledged that “China does not intend to pursue militarization” of the South China Sea. Neither of these promises to the American people was made in good faith. Today, “China is using cyber-enabled theft as part of a global campaign to ‘rob, replicate, and replace’ non-Chinese companies in the global marketplace,” according to Assistant Attorney General John Demers. Meanwhile, the PRC’s military outposts in the South China Sea have been proven “capable of supporting military operations and include advanced weapon systems,” according to the Pentagon.

October 01, 2020 Congressional Record

COUNTERING THREAT OF CHINESE COMMUNIST PARTY The SPEAKER pro tempore. The Chair recognizes the gentleman from Pennsylvania (Mr. Joyce) for 5 minutes. Mr. JOYCE of Pennsylvania. Mr. Speaker, after months of hard work and collaboration, the China Task Force has released our final report, which includes more than 400 solutions to counter the growing threat of the Chinese Communist Party.

This report is the framework for combating the aggressive Chinese Communist regime. After meeting with more than 130 experts, we developed realistic and achievable solutions that take a comprehensive approach to strengthening America’s national security and holding the Chinese Government accountable. We realized that out of our 400 recommendations, 180 are legislative solutions, of which 64 percent are bipartisan and one-third have already passed either the House or the Senate.

Mr. Speaker, these are commonsense solutions that we can vote on today to strengthen our strategic position for tomorrow. As the only physician serving on the China Task Force, it was my privilege to delve into opportunities to strengthen our supply chains and ensure that Americans are never again beholden to the Chinese Government for key medicines or healthcare supplies.

On the Health and Technology Subcommittee, I led efforts to strengthen [[Page H5110]] the supply chains for medicines, semiconductors, and other vital materials. Congress has passed several provisions aimed at advancing research and the manufacturing of critical medical supplies here in the United States. We also created new reporting requirements to help us better understand international supply chains and counter vulnerabilities in the system.

To bolster our technology supply chain, I cosponsored H.R. 7178, the CHIPS Act, to increase domestic production of advanced semiconductors, which will help Americans to develop next-generation telecom technology, fully automated systems, and, importantly, new weapons systems. I also introduced the ORE Act, H.R. 7812, to incentivize the domestic production of rare earth materials, which is key to breaking the Chinese monopoly on critical supply chains. America cannot allow China to win the race to next-generation technology. We want innovative breakthroughs to happen here in this country, and the China Task Force is making progress through the legislative process. As a leader on the competitiveness committee, I focused on issues ranging from combating Chinese Communist-sponsored theft of intellectual property to exposing the influence of the Chinese in U.S. research institutions and countering the importation of illicit fentanyl.

Too often, American companies are being coerced to surrender intellectual property to the Chinese Government in order to gain entry into the Chinese marketplace. In extreme cases, we hear of outright theft by Chinese hackers and agents. The China Task Force has produced recommendations that direct the Federal Government to ramp up investigations of individuals acting as pawns of the Chinese Communist Party and enforce antitheft laws.

Our Nation has also seen wholesale efforts of the Chinese Government to steal research and gain influence at United States universities. In my own backyard, the FBI arrested a former Penn State researcher suspected of espionage. The task force has compiled provisions to increase transparency and accountability in the higher education system, and I introduced legislation to close loopholes and force the disclosure of all foreign money in our research systems. Finally, we must stop illicit fentanyl from reaching our communities and killing our neighbors.

The China Task Force has produced recommendations to stop the importation of these devastating analogues from China. In the House, I cosponsored legislation to hold foreign nations, including China, accountable if they fail to cooperate with U.S. narcotics control efforts and prosecute the production of fentanyl in their countries. I thank Senator Toomey for championing this provision in the Senate.

By implementing these solutions, we can make America safer, stronger, and better equipped to lead in the 21st century. The China Task Force final report is a framework. It is our playbook to make a difference. While our work on this report has finished, our commitment to this cause must and will continue. Phase two starts today.

The 141-page report is found here.


A Battle Against Lies

By: Cliff Kincaid

The Christian existentialist philosopher, Soren Kierkegaard, wrote about the corruption in the Danish State Church, declaring that everyone knew privately that the system was rotten and corrupt but they would not say so publicly. “Just as one says that death has marked a man, so we recognize the symptoms which demand to be attacked. It is a battle against lies,” he said.

The problem we face today is corruption in government, the media, and the church that runs so deep that it is uncomfortable for some to even talk about it publicly.

In his landmark 1975 book, The Corrupt Society, Robert Payne wrote, “There are many weapons that can be used to prevent the corruption of societies. The most powerful of these weapons are vigilance and knowledge. Hence the importance of the press, radio, and television to break through all imposed restrictions to discover how the government works, how it arrives at its decisions, how it manages its defenses, how it deals with traitors, especially the traitors in its midst.”

The tragedy is that, since Payne’s book was published, the press has become as corrupt as the government. I actually noticed this trend when I went to college and studied a textbook, Interpretative Reporting, by Curtis MacDougall, a communist fellow-traveler who admired Castro and hated anti-communist Senator Joe McCarthy. That’s one reason why I went to work out of college monitoring the media for Accuracy in Media.

My friend and former colleague at Accuracy in Media, Roger Aronoff, discussed the corruption in the media in a recent edition of my show America’s Survival TV.

Payne dedicated his book to Richard Nixon, a joke because Payne found Nixon and his administration to be corrupt. It was also a joke because Victor Lasky’s book, It Didn’t Start With Watergate, proved that Democrats were as corrupt, even more so than Republicans.

As we look deeper, we discover that Nixon was singled out for destruction because of his role in helping to expose Soviet spy Alger Hiss in the State Department, and a communist network inside the U.S. government. Ironically, Nixon had persuaded anti-communist Senator Joe McCarthy to avoid investigating communist penetration of one key agency — the CIA. McCarthy would go into Bethesda Naval Hospital with a sore knee and leave in a body bag, allegedly dead of hepatitis, before he could ever launch that inquiry. McCarthy’s strange death was examined in the J.C. Hawkins book, Betrayal At Bethesda.

Many liberals, even to this day, think Hiss was innocent or that the evidence against him is still in dispute. They also despise McCarthy for his investigations of communists in government. Liberal disgust for McCarthy has been adopted by such Never-Trump notables as Jonah Goldberg. Author J.C. Hawkins discussed Goldberg’s strange views during a recent episode of America’s Survival TV.

Goldberg is one of those “responsible conservatives,” in this case someone who achieved prominence because of his mother’s role in the Monica Lewinsky/Bill Clinton scandal, who warns against investigations of what is truly happening behind-the-scenes politically.

Trump’s Attorney General Bill Barr is another so-called “responsible conservative” who refused to do what is necessary to expose the Deep State, of which he is clearly a member. His service to the CIA continues.

We should remember that Nixon had won the 1960 election against John F. Kennedy but had that election stolen from him. He was persuaded to avoid contesting the election in the name of national stability. Subsequently, he was elected president in 1968 and re-elected in 1972.

The accepted history is that Watergate was a White House dirty tricks operation designed to gather dirt on Democratic Party officials by breaking into their offices in the Watergate hotel. In fact, the evidence shows it was a CIA operation, something suspected by “Deep Throat,” the major source for the Washington Post’s Bob Woodward and Carl Bernstein, who turned out to be the FBI’s number two, Mark Felt. The CIA was investigating a high-class prostitution ring that was used by the Democrats and coordinated from their Watergate offices to “entertain” Democrat VIPs. Woodward and Bernstein failed to pursue that line of inquiry.

All of this is now on the public record thanks to John O’Connor’s book, Postgate. I recently interviewed him on America’s Survival TV. What the CIA was doing was later copied by one Jeffrey Epstein, an individual with intelligence connections whose death remains as mysterious as the politicians he videotaped and blackmailed. It was another scandal that Bill Barr failed to uncover.

Again, as we see possible parallels between the fates of Nixon and Trump, Postgate author John O’Conner and others are being featured in the film, “Plot Against the President,” about how the intelligence community targeted Trump in much the same way they brought down Nixon.

Interestingly, Washington Post Watergate reporter Carl Bernstein’s parents were members of the Communist Party. His father had been questioned about a possible relationship with Louise Bransten, a member of a Soviet espionage network.

For his part, Post executive editor Ben Bradlee’s wife was the Post’s longtime religion reporter and Washington insider, elite party planner Sally Quinn, who admitted in her book Finding Magic to her belief in the occult, including casting spells on her enemies, reading Tarot cards, and using Ouija Boards. It seems like she was into something akin to the “spirit cooking” dinners mentioned in the Hillary Clinton emails.

Years, earlier, Jean Houston of the Foundation for Mind Research would try to help Mrs. Clinton, then First Lady,  “communicate” with Eleanor Roosevelt during a mystical “channeling” session.  Washington Post reporter Bob Woodward wrote about these sessions in a book on the 1996 presidential election but he didn’t seem to find anything unusually strange or bizarre about such practices.

Nixon’s resignation was so destabilizing that it led to the communist takeover of Vietnam, with 58,000 Americans having died in vain, and the communist genocide in neighboring Cambodia, costing 2 million lives.

Bringing all of this up to date, we learn that House Speaker Rep. Nancy Pelosi once praised Dr. Carlton Goodlett as a civil rights activist. A communist associate of the Peoples Temple cult leader Jim Jones, whose more than 900 followers committed “revolutionary suicide” in Guyana in 1978, Goodlett was a Lenin Peace Prize winner and a central figure in the Democratic Party in San Francisco. Incredibly, there is a street in San Francisco, Dr. Carlton B Goodlett Place, named after this communist, where City Hall is located.

FBI documents obtained through a Freedom of Information Act request reveal the Soviet communist connections of Carlton Goodlett and his political influence in San Francisco.

The clever change in communist strategy has been to blame the Russians while the Chinese Communists, their partners in crime, take the lead as the “fundamental transformation” of the United States and the world proceeds. Hence, one of the leading progressives, Rep. Jamie Raskin, appearing several years ago at a Trump impeachment rally, blamed the Russians for supporting Trump while his own father, Marcus Raskin, was very close to the Russians when they were officially members of the Soviet Union.

In this way, through lies and skillful deception, Bolshevik Bernie Sanders becomes a respectable “democratic socialist,” someone worthy of being brought into the Biden/Harris camp. For his part, Rep. Raskin is a prominent member of the group “Secular Democrats” that is asking that some conservative “white nationalist” Christians be investigated by a Biden/Harris Administration as potential terrorists by the FBI.  Journalist Leo Hohmann broke this story and discussed it with me on ASI TV.

Don’t look for any guidance from the Vatican and Pope Francis, for they are staging a New Age Nativity scene in St. Peter’s Square that looks like an illustration from the book, God Drives a Flying Saucer.

Equally bizarre, as my family was visiting Rome last February, we took a tour of the Colosseum only to discover a statue of Moloch, the pagan deity of child sacrifice, being displayed. The Colosseum is viewed by many Christians as a sacred site because early Christians were martyred there.

For my part, the yard signs and banners, “Mary was Pro-Life,” and “Unborn Lives Matter,” still remain for visitors to my home. It’s a small thing to do. But these signs send an appropriate message at this time and may just “trigger” somebody into waking up from the lies.

*Cliff Kincaid is president of America’s Survival, Inc. for updates, use the contact form at www.usasurvval.org


GA Gov. Brian Kemp Signed Dominion Contract After Chicom Meeting

By: Daniel John Sobieski

Anyone for Chinese disinformation? While the deep state and its allies among the legacy media and socialist Democrats continue to talk about “Russia, Russia, Russia,” partially in light of the recent and ongoing cyberattack on U.S. institutions, the fact remains that our greatest threat is from the Chinese Communist Party (CCP)  and its ongoing penetration of U.S. institutions from business to higher education to national defense to, yes, our elections.

The Chinese knew what they were doing when Vice President Joe Biden brought son Hunter Biden with him on Air Force Two for a state visit and awarded Hunter with the high-commission management of a  $1.5 billion hedge fund investment. This would not be the only Chinese pay-for-play transaction with the Biden family or the only U.S politician they would seek to corrupt and/or exploit.

It was also no accident that the Chinese would recruit as a useful idiot one Eric Swalwell, an up-and-coming California politician who, with the help of a Chicom “honeypot” would become a U.S. congressman sitting on the vital House Intelligence Committee. As the Washington Times reported:

Suspected Chinese spy Christine Fang, aka Fang Fang, raised funds for Mr. Swalwell’s 2014 reelection and helped place an intern in his office, according to Axios. As a House Intelligence Committee member, Mr. Swalwell’s proximity to the alleged spy raised eyebrows across Washington.

Ms. Fang, who apparently knows how to take care of Congressional members, also managed while sleeping with Swalwell to place an intern in the office of a congressman who had access to classified documents and information few in Congress get to see.

Another Democrat in bed with China is California Sen. Diane Feinstein, who had a Chinese spy in her office and in her car for decades. No one seems curious about the remarkable financial success Feinstein and her third husband, Richard Blum, had in dealings with China with a Chinese spy on her payroll who arrived on the scene in1993, one year after Feinstein was elected to the Senate. As the Los Angeles Times has reported:

On Capitol Hill, Sen. Dianne Feinstein (D-Calif.) has emerged as one of the staunchest proponents of closer U.S. relations with China, fighting for permanent most-favored-nation trading status for Beijing.

At the same time, far from the spotlight, Feinstein’s husband, Richard C. Blum, has expanded his private business interests in China–to the point that his firm is now a prominent investor inside the communist nation….

In 1992, when Feinstein entered the Senate, Blum’s interests in China amounted to one project worth less than $500,000, according to her financial disclosure reports. But since then, his financial activities in the country have increased.

In the last year, a Blum investment firm paid $23 million for a stake in a Chinese government-owned steel enterprise and acquired sizable interests in the leading producers of soybean milk and candy in China. Blum’s firm, Newbridge Capital Ltd., received an important boost from a $10-million investment by the International Finance Corp., an arm of the World Bank. Experts said that IFC backing typically confers legitimacy and can help attract other investors.

No conflict of interest here. “Here’s a more recent connection between Sen Feinstein and China the press has ignored. ZTE, the heavily sanctioned Chinese telecom company that paid a $1billion fine to the US, hired its first in-house lobbyist in ’11 — none other than a former Feinstein aide,” noted Benjamin Weingarten, a contributor for The Federalist, in a tweet. As the Washington Post reported in 2012, Feinstein has a connection to the notorious Chinese communications firm ZTE.

ZTE, which is also based in Shenzhen, spent $80,000 on U.S. lobbying in the first six months of this year, down from $100,000 for the same period a year earlier, Senate records show. In October 2011, the company registered its first in-house lobbyist, Peter Ruffo, a former aide to Sen. Dianne Feinstein (D-CA).

The Chinese are patient and clever and play no favorites which leads us to the curious connection between the Chinese Communist Party, Dominion Voting Systems, and RINO Gov. Brian Kemp in Georgia where two critical Senate runoffs are to be held on Jan. 5. Should both Democrats win, friend-of-China Joe Biden will run the table and return us to the days before President Trump and punitive tariffs when China was allowed to gut U.S. industry with unfair trade practices as it stole at least $500 billion in intellectual property each year.

According to USA Today — Dominion lobbyists have also included Republicans, namely Jared Thomas, a former campaign manager and elections staffer for Georgia Gov. Brian Kemp when he served as secretary of state, overseeing elections, the Atlanta Journal-Constitution reported.  Mr. Thomas helped secure a #107 million Georgia contract with Dominion for a new voting system Georgia did not need. Thomas was hired out of Kemp’s office, according to investigative journalist Paul Sperry, by Dominion salesman Barry Herron. Interestingly, the Dominion contract was signed just two weeks after he met with the Houston-based Consul General of the People’s Republic of China in Atlanta. Houston is where the Trump administration ordered the consulate closed because it was a hotbed of Chinese spying. As the Tennessee Star reported:

Kemp met with Li Qiangmin, Houston Consul General of the People’s Republic of China, on July 12, 2019.

The Secretary of State’s office announced on July 29, 2019 that Dominion’s election services were procured to implement a “verified paper ballot system” in the state prior to the March 2020 presidential primaries….

According to reports, the voting software company has multiple links to China, including a $400 million filing in the U.S. Securities and Exchange Commission (SEC) one month before the election that links Dominion, UBS Securities LLC, and China….

Also concerning to many, is Dominion’s use of components made in China.

During congressional testimony in January, John Poulos, the President and CEO of Dominion, admitted that parts for their voting machines are manufactured in China.

“We do have components in our products that come from China. Our tabulated products have always been manufactured in the United States,” Poulos said. The Chinese components, he said, included “LCD components, the actual glass screen on the interface down to the chip component level.”

Additionally, there are new reports that a company owned by a Chinese firm manufactures modems that are used by Dominion in their voting machines….

In July of 2019, Li Qiangmin, Consul General of the People’s Republic of China, met with Kemp in Atlanta to discuss trade and tourism issues, according to U.S. China News.

On behalf of the state government, Governor Brian Kemp thanked Consul General Li Qiangmin for his contribution to the development of Trade and Tourism between China and Georgia over the past five years. Consul General Li stressed the importance of the development of friendly relations between China and the United States and welcomed Governor Brian Kemp’s early visit to China.

After the meeting, Gov. Brian Kemp personally presented “Inspired Georgia” to Consul General Li Qiangmin on the title page of the book. Consul General Li also returned fine Chinese crafts to the governor.

Also attending the meeting were the Executive Director of China Affairs of the Georgia Economic Development Agency, China Chief Representative (Global Business) Xu Siwei and Jassy, China Manager of the Jozhou Tourism Bureau, and Liu Bo and Ge Mingdong, Head of the Chinese Consulate General in Houston”.

Former Overstock.com CEO Patrick Byrne confirms China’s interest and meddling in the 2020 U.S. elections. As reported by Epoch Times:

Election fraud is the secret “assassin’s mace” of the Chinese Communist Party (CCP) that has long confounded security hawks, according to tech billionaire and entrepreneur Patrick Byrne, who back in August assembled a cyber intelligence team to analyze the U.S. voting system.

“For 10 years or more, there have been references to a coming ‘assassin’s mace’ in the Chinese literature—where they take out the United States with one stroke,” Byrne told The Epoch Times’ “American Thought Leaders” program. “The national security community in the United States has been trying to figure this out: Is it their new aircraft carrier? Is that the hypersonic missile? Is it this, that, is it an EMP?”

“I don’t think so, ” he told host Jan Jekielek. “The one stroke that takes the United States out is what we’re experiencing right now.”…

Byrne has been a driving force in the research for lawsuits filed by attorneys Lin Wood and Sidney Powell. He has also been working together with ASOG, the company that recently carried out the forensic audit on voting machines in Antrim County, Michigan….

Byrne says that the manipulation of the voting systems can be traced back to China.

“There’s a chain of command basically from China through Iran to Cuba and Venezuela,” he said. “The Chinese are funding Smartmatic through the Panamanian division of Smartmatic, but it bounces through Venezuela.”

“There is code buried within the Dominion machines that has been turned up that seems to show Chinese provenance.”

“There are Chinese developers under the hood of this stuff back in China who are actually getting their software into the Smartmatic systems which have infiltrated at least two of the main voting systems used domestically.”…

(While Smartmatic and Dominion deny any linkage between the two) Byrne, however, says that software created by Smartmatic went through a series of corporate mergers, acquisitions, divestments, and licensing agreements before ending up in at least two of the main commercial voting systems being used in the United States, including Dominion. “Its genetic lineage [goes] back to the software,” he says.

Tucker Carlson of the now fake news Fox News has attacked the findings of Byrne and Powell, even basically calling Powell a liar. But the dots are easy to connect and they lead to Brian Kemp. Tucker notes that Powell has been all over conservative media presenting her case, for example, on Lou Dobbs Tonight and with Rush Limbaugh, but apparently, Carlson has not been paying attention to any of it. So for his edification, here are a few more choice examples:

Speaking on Lou Dobbs last night, Sidney Powell began explaining just part of the evidence she has of massive,  widespread election fraud that occurred to steal the race from President Trump.

Earlier in the day, Powell spoke on the Rush Limbaugh show, outing the process of stopping the counts, and the fact that Brian Kemp (Georgia Governor) collected kickbacks from the Dominion company. Widespread election fraud that occurred to steal the race from President Trump….

“I’ve got a firsthand witness. In fact, I’ve just emailed you an affidavit from a witness who can now be used publicly. It’s redacted in some places but he was present for the creation of the system for this specific purpose of falsifying election results for Hugo Chavez and then Maduro. They exported this all over Latin America. It’s the Smartmatic and Dominion systems that were built to do this very thing, for changing the results of elections… And he realized when things were happening the way they were here, particularly with the states the suddenly went down, they stopped counting the votes. It was because the need was so great to [beat] President Trump that they had to go in and do a separate reset on the machines to have them come out for Biden.”

Sidney Powell has presented clear evidence that this has been done before here and overseas using computer and software manipulation tools loosely referred to as “Hammer And Scorecard” developed and used by our intelligence agencies including the CIA under the Obama administration:

Sidney Powell is not some clickbaiting queen… she announced that there is evidence that the CIA tools were used to alter election counts on software systems in the swing states.

Last week, CDP posted a story about how democrats were conspiring with rouge agents in the Central Intelligence Agency in order to utilize a tool called SCORECARD, which has the power to alter voting machine numbers.

And now, Sidney Powell (attorney for Michael Flynn and part of the president’s legal team) has announced that they have evidence that this tool was used, in conjunction with THE HAMMER to rig the election for Joe Biden…..

In February 2009, the Obama administration commandeered a powerful supercomputer system known as THE HAMMER. THE HAMMER includes an exploit application known as SCORECARD that is capable of hacking into elections and stealing the vote, according to CIA contractor-turned-whistleblower Dennis Montgomery, who designed and built THE HAMMER.

THE WHISTLEBLOWER TAPES, confidential audio recordings released by U.S. District Judge G. Murray Snow’s courtroom in November 2015, revealed that SCORECARD was deployed by the Obama team against Florida election computers to steal the 2012 presidential election on behalf of President Barack Obama and Vice President Joe Biden….

The Democrats tested their technology during the Democrat party primaries. Otherwise Bernie Sanders would have won the 2020 nomination. SCORECARD was utilized on behalf of Joe Biden during the 2020 primary against Bernie Sanders. The Democrat primary was stolen from Bernie Sanders.

CIA whistleblower Dennis Montgomery turned over a massive cache of illegally harvested surveillance and election  data in August 2015 and December 2015 to the FBI and CIA under two immunity agreements that were granted to Montgomery by Assistant U.S. Attorney Deborah Curtis and FBI General Counsel James Baker.

If Tucker Carlson wants evidence of anti-Trump foreign actors being able to meddle in our elections, he should get in touch with Secretary of State Ruth R. Hughes of Texas and re-read her report, “REPORT OF REVIEW OF DOMINION VOTING SYSTEMS”, detailing why Texas rejected the use of their voting machines and software:

The nation’s three largest voting machine manufacturing vendors — Election Systems & Software (ES&S), Dominion Voting Systems, and Hart InterCivic — have all publicly acknowledged that they place modems in some of their vote tabulators and scanners.

While the vendors claim that their “firewalls” protect computers from outside interference, many of the nation’s leading technical experts say this claim is bogus

“Once a hacker starts talking to a voting machine through the modem,” says Princeton University Computer Science professor Andrew Appel, “they can hack the software and make it cheat in future elections.” It’s as straightforward as that.

So, what can we do?

“We should be unplugging all of these machines from the internet,” says Kevin Skoglund, the computer scientist who led the 10-expert investigatory team. This means keeping elections technologies disconnected all the time, including on election night.

“We cannot make our computers perfectly secure,” says Andrew Appel. “What we should do is remove all of the unnecessary, hackable pathways, such as modems. We should not connect our voting machines directly to the computer networks. That is just inviting trouble.”

States like Georgia, Pennsylvania, Nevada, Georgia, and Wisconsin invited such trouble and got it. Software developed in Venezuela under the auspices of Maduro and votes stored on foreign servers connected via the Internet is an invitation to foreign hackers with malign interests.

An investigation into the connection of Dominion Voting Systems with Georgia politicians, ironically Republican ones, as the Democrats are preparing to march through Georgia on January 5 and steal two Senate seats from the GOP, enabling them to destroy our democracy and end our constitutional liberties, is being conducted by the good folks at American Oversight:

In July 2019, Georgia Secretary of State Brad Raffensperger announced that the state had awarded a $107 million contract to manufacturer Dominion Voting Systems to replace existing voting machines with a new “verified paper ballot system.” As reported by the Atlanta Journal-Constitution, both Dominion and the state’s former elections company, Election Systems & Software, had connections with Gov. Brian Kemp’s administration. Dominion lobbyist Jared Thomas had been a longtime political and campaign aide to Kemp, who previously served as secretary of state, and another lobbyist, Barry Herron, had worked for Diebold Election Systems, which had originally sold Georgia its electronic voting machines.

Georgia voters had complained about malfunctioning voting machines after the November 2018 midterm elections, even filing a lawsuit aimed at overhauling the state’s election system, including the electronic machines. But critics worry that the new electronic ballot-printing devices from Dominion won’t be much better, contending that hand-marked paper ballots remain the most secure voting method. In fact, the new devices were given a test run in six Georgia counties during the November 2019 election and ran into a number of issues. And records we’ve already obtained showed that voter check-in devices used “1234” as their default password — an “exceptionally weak security measure.” (State officials have said the passwords have been changed.)

Elsewhere in the state, voters reported long lines and ballot issues, and concerns remain about the hidden costs of the new voting system, the state’s planned purge of 300,000 names from its voter rolls, and security weaknesses in voting equipment. With the 2020 elections looming and the security of U.S. voting systems less than certain, American Oversight is investigating state officials’ communications with Dominion Voting Systems and its subcontractor KnowInk and is requesting records that could shed light on how the state is working to ensure secure and accurate elections.

The Chinese had every interest in helping to steal the election for Joe Biden and helping globalist China lovers like Brian Kemp. Follow the money – and the Chinese.

*Daniel John Sobieski is a former editorial writer for Investor’s Business Daily and freelance writer whose pieces have appeared in Human Events, Reason Magazine, and the Chicago Sun-Times among other publications.


Trapper’s Quote Of The Week

By: Trapper Pettit

Imagine walking into your home to see your wife and daughter lying on the floor. Their faces are bruised and battered, clothes ripped, your daughter seems comatose, and your wife is mumbling the word rape. Now transpose in your mind the horror and rage you would feel to one word… CHINA.


Bill Barr Still Covers for the CIA

By: Cliff Kincaid

As Bill Barr is walking out the door of the Department of Justice to open presents on Christmas day, Kimberley A. Strassel of the Wall Street Journal tells us that he is an honest and upstanding Attorney General who believes there was no CIA role in the effort to bring down President Trump. Barr, a former CIA analyst, had come to the conclusion that he didn’t “see any sign of improper CIA activity” and that “The CIA stayed in its lane.”

This is comparable to Joe Biden saying there’s nothing in his son’s laptop worth seeing.

The CIA did not stay in its lane. The driver was drunk and the agency swerved all over the road in an attempt to take out Trump.

Former CIA officials Michael Morell, Michael Hayden, and Philip Mudd had all denounced Trump when he ran in 2016. Former CIA operations officer Evan McMullin even ran against him as an independent presidential candidate.

What’s more, the list of those denouncing consideration of Hunter Biden’s laptop revelations prior to the election was dominated by the CIA. (see the list of CIA signers at the end of this column). Their letter was used by Joe Biden during the campaign to suggest the laptop story was a Russian plot.

What does the CIA have to hide?

Our 2015 book, The Sword of Revolution and the Communist Apocalypse, features an interview with a former U.S. intelligence agency official who explained how the Sino-Soviet split deceived U.S. policymakers and weakened the Free World. His perspective was a dissenting view in the CIA and intelligence community bureaucracy.

Such thinking is evident in media stories about the “accidental” nature of where and how the China virus came to be. You are not permitted to believe that the Communist Chinese would deliberately infect the world.

The Office of the Director of National Intelligence says that the Intelligence Community “concurs with the wide scientific consensus that the COVID-19 virus was not manmade or genetically modified.” Our intelligence agencies have gotten it wrong before. Did they get this one wrong, too? Or did they get it wrong deliberately because they are compromised by the Chinese?

Strassel is the latest “conservative” media figure to fall for Barr’s nonsense. She also wrote a May 18, 2017, column about the appointment of Russia-gate prosecutor Robert S. Mueller, saying the former FBI director was “as skilled and upright as they come” and insisted that his name comes associated with such words as “integrity, honor, respect, order, discipline, honesty, fairness.” She added that “…nobody doubts Mr. Mueller will lead as professional an investigation as he is capable of conducting.”

Another dupe was Mark Levin, who gave Barr a platform on his show to spout nonsense while failing to get to the bottom of Obama-gate. Barr ruled out prosecuting Obama and/or his Vice President Joe Biden for a criminal conspiracy to destroy the Trump presidency.

Barr did appoint a special counsel to look into Obama-gate, but there’s nothing to report here, either, except for a low-level FBI fall guy.

Barr dropped the Flynn case and made occasional statements about how Russia-gate prosecutor Robert Mueller had gone too far. He also made grunts and groans about missteps by the Deep State, especially on Mark Levin’s program.

Basically, his message was that the Deep State was a little sloppy.

But there’s more. Barr “makes no apology for declining to divulge before the election that Hunter Biden was under investigation,” Strassel reports in her column. In other words, he covered-up for China Joe and his family.

Now, why would he suppress that news? Perhaps because his former colleagues in the CIA were telling him that the Hunter Biden laptop emails were part of a Russian plot.

“From 1973 to 1977,” says his official bio, “he served in the Central Intelligence Agency before receiving his J.D. with highest honors from George Washington University Law School in 1977.”

I am not sure what “served” means. I would change it to present tense “serves.”

The New York Times trumpeted the news that Barr had told Strassel that the CIA was cleared in Russia-gate. It said, “The Justice Department’s examination of the investigations into Russia’s interference in the 2016 election has cleared the C.I.A. of suspicions that it targeted President Trump and his associates, Attorney General William P. Barr said in an interview published on Friday.”

The phrase “The CIA stayed in its lane” is now part of the history of Russia-gate, despite the evidence to the contrary.

The Federalist reported before the election that CIA Director Gina Haspel is “personally blocking the declassification and release” of key Russia-gate documents in the hopes that President Donald Trump will lose his re-election bid and because they “could embarrass the CIA and potentially even implicate Haspel herself.”

“Haspel has repeatedly lied to the president about the status of documents to be declassified,” one intelligence community source told the publication.

When Trump nominated Haspel for the position, the White House said she had “gained widespread support from former intelligence and national security officials,” many of whom opposed Trump. The White House cited these “facts,” among others:

  • John Brennan, former CIA Director during the Obama Administration, stated Haspel “has the experience—the breadth and depth—on intelligence issues.”
  • Michael Hayden, former CIA Director during the Clinton and Bush

The White House was trying to feed the beast, to appease the Deep State. The CIA returned the favor by branding the incriminating Hunter Biden laptop emails as a Russian plot. And Barr has the audacity to say the agency “stayed in its lane.”

Let’s take a look at the admitted CIA names on the list of those denouncing consideration of Hunter Biden’s laptop revelations prior to the election (Remember that they signed a letter for Joe Biden suggesting the laptop story was a Russian plot):

  • Mike Hayden, Former Director, Central Intelligence Agency
  • Leon Panetta, Former Director, Central Intelligence Agency
  • John Brennan, Former Director, Central Intelligence Agency
  • John McLaughlin Former Acting Director, Central Intelligence Agency Former Deputy Director, Central Intelligence Agency Former Director of Analysis, Central Intelligence Agency
  • Michael Morell, Former Acting Director, Central Intelligence Agency, Former Deputy Director, Central Intelligence Agency
  • Mike Vickers, Former Operations Officer, Central Intelligence Agency
  • Doug Wise, Former Senior CIA Operations Officer
  • Andy Liepman, Former Senior Intelligence Officer, Central Intelligence Agency
  • John Moseman, Former Chief of Staff, Central Intelligence Agency
  • Larry Pfeiffer, Former Chief of Staff, Central Intelligence Agency
  • Jeremy Bash, Former Chief of Staff, Central Intelligence Agency
  • Rodney Snyder, Former Chief of Staff, Central Intelligence Agency
  • David B. Buckley, Former Inspector General, Central Intelligence Agency
  • Nada Bakos, Former Analyst and Targeting Officer, Central Intelligence Agency
  • Patty Brandmaier, Former Senior Intelligence Officer, Central Intelligence Agency
  • James B. Bruce, Former Senior Intelligence Officer, Central Intelligence Agency
  • David Cariens, Former Intelligence Analyst, Central Intelligence Agency
  • Janice Cariens, Former Operational Support Officer, Central Intelligence Agency
  • Paul Kolbe, Former Senior Operations Officer, Central Intelligence Agency
  • Peter Corsell, Former Analyst, Central Intelligence Agency
  • Brett Davis, Former Senior Intelligence Officer, Central Intelligence AgencyFormer National Intelligence Officer
  • Steven L. Hall, Former Senior Intelligence Officer, Central Intelligence Agency
  • Kent Harrington, Former National Intelligence Officer for East Asia, Central Intelligence Agency Former Director of Public Affairs, Central Intelligence Agency, Former Chief of Station, Central Intelligence Agency Former Analyst, Central Intelligence Agency
  • Timothy D. Kilbourn, Former Dean, Sherman Kent School of Intelligence Analysis, Central Intelligence Agency Former PDB Briefer to President George W. Bush, Central Intelligence Agency
  • Ron Marks, Former Officer, Central Intelligence Agency
  • Jonna Hiestand Mendez, Technical Operations Officer, Central Intelligence Agency
  • Emile Nakhleh, Former Director of the Political Islam Strategic Analysis Program, Central Intelligence Agency Former Senior Intelligence Analyst, Central Intelligence Agency
  • Gerald A. O’Shea, Senior Operations Officer, Central Intelligence Agency, Served four tours as Chief of Station, Central Intelligence Agency
  • David Priess, Former Analyst and Manager, Central Intelligence Agency Former PDB Briefer, Central Intelligence Agency
  • Pam Purcilly, Former Deputy Director of Analysis, Central Intelligence Agency, Former Director of the Office of Russian and European Analysis, Central Intelligence Agency Former PDB Briefer to President George W. Bush, Central Intelligence Agency
  • Marc Polymeropoulos, Former Senior Operations Officer, Central Intelligence Agency, Former Acting Chief of Operations for Europe and Eurasia, Central Intelligence Agency
  • Chris Savos, Former Senior Intelligence Officer, Central Intelligence Officer
  • Nick Shapiro, Former Deputy Chief of Staff and Senior Advisor to the Director, Central Intelligence Agency
  • John Sipher, Former Senior Operations Officer, Central Intelligence Agency, Former Deputy Chief of Russian Operations, Central Intelligence Agency
  • Stephen Slick, Former Senior Director for Intelligence Programs, National Security Council Former Senior Operations Office, Central Intelligence Agency
  • Cynthia Strand, Former Deputy Assistant Director for Global Issues, Central Intelligence Agency
  • Greg Tarbell, Former Deputy Executive Director, Central Intelligence Agency, Former Analyst of the Soviet Union and Russia, Central Intelligence Agency
  • David Terry, Former Chairman of the National Intelligence Collection Board Former Chief of the PDB, Central Intelligence Agency, Former PDB Briefer to Vice President Dick Cheney, Central Intelligence Agency
  • John Tullius, Former Senior Intelligence Officer, Central Intelligence Agency
  • David A. Vanell, Former Senior Operations Officer, Central Intelligence Agency
  • Winston Wiley, Former Director of Analysis, Central Intelligence Agency, Former Chief, Counterterrorism Center, Central Intelligence Agency
  • Kristin Wood, Former Senior Intelligence Officer, Central Intelligence Agency, Former PDB Briefer, Central Intelligence Agency

In addition, reported the letter signers, there were “nine additional former IC [Intelligence Community] officers who cannot be named publicly” and “also support the arguments in this letter.”

Remember these CIA and Intelligence Community people signed a letter designed to usher China Joe Biden into the White House by claiming that the story of the Hunter Biden laptop emails, suppressed by Big Tech, had “all the classic earmarks of a Russian information operation.”

Using the Wall Street Journal columnist Strassel as a mouthpiece, Bill Barr says the CIA stayed in its lane. If true, that’s frightening. It means they’re they are trying to bring to power a pawn of the Communist Chinese.

Trump must resist by any means necessary.

  • Cliff Kincaid is president of America’s Survival, Inc. for updates, use the contact form at usasurvival.org

Increased Alarm Over Intrusion Into U.S. and Sandia/Los Alamos

By: Denise Simon | Founders Code

WASHINGTON (AP) — Federal authorities expressed increased alarm Thursday about an intrusion into U.S. and other computer systems around the globe that officials suspect was carried out by Russian hackers. The nation’s cybersecurity agency warned of a “grave” risk to government and private networks.

The Cybersecurity and Infrastructure Security Agency said in its most detailed comments yet that the intrusion had compromised federal agencies as well as “critical infrastructure” in a sophisticated attack that was hard to detect and will be difficult to undo.

CISA did not say which agencies or infrastructure had been breached or what information taken in an attack that it previously said appeared to have begun in March.

“This threat actor has demonstrated sophistication and complex tradecraft in these intrusions,” the agency said in its unusual alert. “CISA expects that removing the threat actor from compromised environments will be highly complex and challenging.”

President Donald Trump, whose administration has been criticized for eliminating a White House cybersecurity adviser and downplaying Russian interference in the 2016 presidential election, has made no public statements about the breach.

President-elect Joe Biden said he would make cybersecurity a top priority of his administration, but that stronger defenses are not enough.

“We need to disrupt and deter our adversaries from undertaking significant cyberattacks in the first place,” he said. “We will do that by, among other things, imposing substantial costs on those responsible for such malicious attacks, including in coordination with our allies and partners.”

The cybersecurity agency previously said the perpetrators had used network management software from Texas-based SolarWinds to infiltrate computer networks. Its new alert said the attackers may have used other methods, as well.

Over the weekend, amid reports that the Treasury and Commerce departments were breached, CISA directed all civilian agencies of the federal government to remove SolarWinds from their servers. The cybersecurity agencies of Britain and Ireland issued similar alerts.

A U.S. official previously told The Associated Press that Russia-based hackers were suspected, but neither CISA nor the FBI has publicly said who is believed be responsible. Asked whether Russia was behind the attack, the official said: “We believe so. We haven’t said that publicly yet because it isn’t 100% confirmed.”

Another U.S. official, speaking Thursday on condition of anonymity to discuss a matter that is under investigation, said the hack was severe and extremely damaging although the administration was not yet ready to publicly blame anyone for it.

“This is looking like it’s the worst hacking case in the history of America,” the official said. “They got into everything.”

The official said the administration is working on the assumption that most, if not all, government agencies were compromised but the extent of the damage was not yet known.

This hack had nothing to do with President Trump firing Director Krebs at CISA even though the Associated Press keeps suggesting it does. But things just took a turn for the bad, bad side –>

Sandia National Laboratories – From the Manhattan Project to a National Lab Sandia

Texas A&M System part of team awarded lucrative Los Alamos National Lab  contract | The Texas Tribune

Los Alamos

The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.

On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.

They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation, and the Richland Field Office of the DOE. The hackers have been able to do more damage at FERC than the other agencies, the officials said but did not elaborate.

Federal investigators have been combing through networks in recent days to determine what hackers had been able to access and/or steal, and officials at DOE still don’t know whether the attackers were able to access anything, the people said, noting that the investigation is ongoing and they may not know the full extent of the damage “for weeks.”

Spokespeople for DOE did not immediately respond to requests for comment.

The attack on DOE is the clearest sign yet that the hackers were able to access the networks belonging to a core part of the U.S. national security enterprise. The hackers are believed to have gained access to the federal agencies’ networks by compromising the software company SolarWinds, which sells IT management products to hundreds of government and private-sector clients.

DOE officials were planning on Thursday to notify the House and Senate Energy committees, House and Senate Energy and Water Development subcommittees, House and Senate Armed Services committees, and the New Mexico and Washington State delegations of the breach, the officials said.

The FBI, Cybersecurity and Infrastructure Security Agency, and Office of the Director of National Intelligence acknowledged the “ongoing” cybersecurity campaign in a joint statement released on Wednesday, saying that they had only become aware of the incident in recent days.

“This is a developing situation, and while we continue to work to understand the full extent of this campaign, we know this compromise has affected networks within the federal government,” the statement read.

NNSA is responsible for managing the nation’s nuclear weapons, and while it gets the least attention, it takes up the vast majority of DOE’s budget. Similarly, the Sandia and Los Alamos National Labs conduct atomic research related to both civil nuclear power and nuclear weapons. The Office of Secure Transportation is tasked with moving enriched uranium and other materials critical for maintaining the nuclear stockpile.

Hackers may have been casting too wide a net when they targeted DOE’s Richland Field Office, whose primary responsibility is overseeing the cleanup of the Hanford nuclear waste site in Washington state. During World War II and the Cold War, the U.S. produced two- thirds of its plutonium there, but the site hasn’t been active since 1971.

The attack on the Federal Energy Regulatory Commission may have been an effort to disrupt the nation’s bulk electric grid. FERC doesn’t directly manage any power flows, but it does store sensitive data on the grid that could be used to identify the most disruptive locations for future attacks.


After Lying, Ambassador Yovanovitch has a Fat Job at Georgetown

By: Denise Simon | Founders Code

Ambassador (ret.) Marie L. Yovanovitch is a Senior Fellow in the Russia and Eurasia Program at the Carnegie Endowment for International Peace, which is at Georgetown University’s Walsh School of Foreign Service.

(Washington, DC) – Judicial Watch announced today that it received 210 pages of records from the State Department which show that former U.S. Ambassador to Ukraine Marie “Masha” Yovanovitch had specifically warned in 2017 about corruption allegations against Burisma Holdings. During her November 2019 testimony in the impeachment proceedings against President Donald Trump, Yovanovitch told lawmakers that she knew little about Burisma.

The records were obtained by Judicial Watch in response to a FOIA lawsuit filed in January 2020 seeking records of communications from the U.S. Embassy in Kyiv mentioning Burisma (Judicial Watch v. U.S. Department of State (No. 1:20-cv-00229)).

On October 4, 2017, Michael Polt, a former ambassador to Estonia and Serbia and who until October 2020 was Senior Director at the McCain Institute, emailed Yovanovitch regarding the McCain Institute’s plan to conduct leadership development training for Ukrainian prosecutors that would be funded by Burisma. The idea was suggested to Polt by Sally Painter, Burisma’s lobbyist at Blue Star Strategies, and a Burisma executive. In the email, Polt notes that he was introduced to Painter by U.S. special envoy to Ukraine, Kurt Volker. Volker was also a Trump impeachment witness.

Polt emails Yovanovitch on October 4, 2017:

Dear Masha: Greetings from the home front and all the best for your complex assignment in Kiev! I wonder if I could pick your brain on a leadership development we have been asked to run for Ukrainian public prosecutors here at the McCain Institute. Kurt cannot get involved with this, due to his other role as Special Envoy. Sally Painter of Blue Star Strategies, whom Kurt introduced to me and then stepped aside, together with Vadym Poharskyi of the Burisma Group have asked us whether we could provide a two-week Leadership Development and Professional Capacity Building program for Ukrainian public prosecutors proposed to us by the Ukrainian Chief Prosecutor. Burisma would fun this. We are prepared to do this, as we have done for similar groups from the DRC [Democratic Republic of the Congo] and from Pakistan. I would greatly appreciate your view if you know Burisma and/or Vadym or others.

Yovanovitch, in her response, warned Polt about Burisma, writing:

Mike: Sorry not to have responded more quickly. I will get back to you with a fuller response, but I would urge caution in dealing with the Burisma Group. It is widely believed that the owner was the beneficiary of the corrupt justice system here and I think –to the extent that anyone is aware that Burisma is funding the training –there would be raised eyebrows in Kyiv over the irony of Burisma training prosecutors and to what end.

I’d also note that the PGO [Prosecutor General’s Office] is one of the entities here that remains resolutely unreformed. After a year and a half of trying, we pulled out and reprogrammed our resources into other areas in the justice sector that were ready for change. Wish I had better news and will get back to you with more details.

In a November 7, 2017, email to Yovanovitch, Polt indicates that he is taking her “sage advice” and “not moving forward” with Burisma’s funding of the training.

During her November 15, 2019, testimony before the House Intelligence Committee in the impeachment proceedings, Yovanovitch said she didn’t have much knowledge about Burisma, and noted that she only learned of its connection to the Biden family through “press reports” she read while preparing for her Senate confirmation hearing.

The new production of records from the State Department also includes several emails regarding the U.S. Embassy in Kyiv’s response to John Solomon’s reporting for The Hill. The emails are almost entirely redacted, as are the names of the officials involved. In one email regarding this effort, an unidentified official cites a report by the George Soros-funded Anti-Corruption Action Center defending itself against the reporting as a “useful reference point.”

The U.S. Embassy in Kyiv closely monitored media and social media reaction to many conservatives and journalists in potential violation of federal law.

“Marie Yovanovitch knew much more about Burisma than what she revealed in her testimony at the sham impeachment hearings,” said Judicial Watch President Tom Fitton. “Judicial Watch will continue its efforts to unearth the shady details in the Burisma-Biden scandal that is not going to go away.”

In an October production from the State Department, Judicial Watch received records which included a briefing checklist of a February 22, 2019, meeting in Kyiv between Yovanovitch and Painter. The briefing checklist noted that Painter also planned to meet with Foreign Commercial Service (FCS) Officer Martin Claessens “regarding the Burisma Group energy company.”

At the time of the meeting, Hunter Biden, son of former Vice President Joe Biden, was serving on the board of directors for Burisma Holdings, a Ukrainian energy firm, despite having no previous experience in the energy industry. Biden served on the board of Burisma until his term expired in April 2019.

In September 2020, Judicial Watch made public records that show George Kent, the Obama administration’s deputy assistant secretary of state in charge of Ukraine policy, which was copied to Yovanovitch, highlighting Russia-linked media “trolling” Joe Biden over “his son’s business.”

In a related case Judicial Watch uncovered records showing the U.S. embassy in Ukraine monitoring, in potential violation of law, Donald Trump, Jr. Rudy Giuliani, and major journalists on Twitter on their commentary on Ukraine, “Biden-Burisma 2020,” and George Soros. The search terms that were flagged to be monitored by State Department officials on social media included Yovanovitch, Ukraine Ambassador, Ukrainian Ambassador, Ukraine Soros, Clinton campaign, and Biden-Burisma.