Reported Chinese Defector With Information About Wuhan Lab Possibly Related to Sun Lijun, Former Chinese Deputy Minister of Public Security


Posted originally on the conservative tree house on June 4, 2021 | Sundance | 138 Comments

Red State is reporting on a defector to the Defense Intelligence Agency (DIA) who is presumably giving the U.S. government information related to the leak from Wuhan BioLab.

RED STATE – […] “Sources tell RedState the defector has been with the DIA for three months and that he has provided an extensive, technically detailed debrief to US officials. In DIA’s assessment, the information provided by the defector is legitimate. Sources say the level of confidence in the defector’s information is what has led to a sudden crisis of confidence in Dr. Anthony Fauci, adding that U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) personnel detailed to DIA have corroborated very technical details of information provided by the defector. (read more)

Interestingly, one of the incredibly astute Twitter researchers who focuses on China, “aka Ben“, previously reported on the family of Sun Lijun who defected to Australia in February of last year.  Sun Lijun was the former Chinese Deputy Minister of Public Security who was sent to Wuhan to manage (aka cover-up) the SARS-CoV-2 breakout.  His wife and children fled China during the height of the pandemic spread.

As Ben noted: after Sun Lijun’s family defected to Australia in February 2020, Sun Lijun was arrested by the Chinese Communist Party in April 2020 under the auspices of corruption charges; a familiar way of dealing with those who defy the communist regime.  If the defector identified within the Red State reporting is accurate, the description would align with someone very close to Lijun (likely), if not Lijun himself (less likely).

Ben is always well researched and accurate. We’ll keep watching…

Tiananmen 32 Years Ago Today


Posted originally on the conservative tree house on June 4, 2021 | Sundance | 259 Comments

It was 32 years ago tonight when the Chinese government sent the Mongolian Army into Tiananmen Square to crackdown on the mostly student protestors.

It is against the law in China to recognize today, memorialize the dead, or even speak publicly of this bloody anniversary. Few people know the short and long-term political ramifications to this event which extended far beyond the borders of China.

Many people are familiar with this image:

However, not as many people are as familiar with the wide shot.

That’s some serious courage right there.

The June 4th 1989 anniversary holds a great deal of personal significance for those who witnessed the events.

Few people even know how most of the regular Chinese military refused orders to open fire on the protesting crowd. Hundreds of young Chinese military soldiers actually formed lines around the mostly student activists in an effort to protect them. The Chinese government eventually bypassed the regulars and instructed the Mongolian military divisions who carried out the orders.

No-one really knows how many were killed, and even the families of the fallen were too scared to speak publicly.

Those who were lost live-on in whispered memories of lore.

So many.

So young.

We remember.

…Then the tanks came….

German Youth Rising


Armstrong Economics Blog/Germany Re-Posted May 30, 2021 by Martin Armstrong

My friends in Germany are asking when will American rebel?

German RAP Song against COVID showing the Youth is also not buying this COVID scam.

Cold War II—Just How Dangerous Is China?


interview with H. R. McMasterMatt PottingerTuesday, April 13, 2021https://www.podbean.com/media/player/gpny2-100a042?from=yiiadmin&skin=1&btn-skin=102&share=1&fonts=Helvetica&auto=0&download=0&rtl=0

China is a nation with 1.3 billion people, an economy projected to become bigger than the United States’ in just a few years, and a rapidly growing military.  Hong Kong has already fallen under its authority. Meanwhile, Taiwan looms in the distance—with a population of almost 24 million, it’s a technology hub and the world’s leading manufacturer of microchips and other items essential to high tech. What are China’s ambitions toward Taiwan? And if they are ominous, what should the US response to Chinese aggression be? To answer these questions, we’re joined by two experts: former national security advisor (and current Hoover Institution senior fellow) H. R. McMaster and former US deputy national security advisor (and current Hoover distinguished visiting fellow) Matthew Pottinger. They also discuss the Biden administration’s recent diplomatic encounters with China, and which countries might be allies in a conflict with China—and which ones would not be. 

Sunday Talks, Rand Paul Discusses Big Picture Ramifications From Current JoeBama Policy


Posted originally on the conservative tree house April 25, 2021 | Sundance | 137 Comments

Senator Rand Paul appears on Maria Bartiromo to discuss the ongoing ramification from current leftist policy as being produced on Capitol Hill.  The interview begins with Senator Paul discussing the leftist definitions of ‘infrastructure’ and how left-wing groups are beneficiaries of trillions of taxpayer funds.

On the economic ramifications Senator Paul notes the impact of massive capital gains increases and how increasing corporate income taxes only provides incentives for national companies to establish themselves overseas to avoid tax liability.  The multinational corps, those already positioned overseas, do not have the same risk exposure to corporate tax increases, thus they do not oppose legislation that hurts national business and small U.S. corporations.

Overall the points made by Rand Paul are all valid; however, those in DC still hold back from pointing out the intent of the JoeBama group – that’s frustrating.  This game where incompetence is claimed under the guise of ‘benefit of doubt’ is a severe weakness within the GOP.  The refusal to aggressively confront Obama 3.0 is beyond frustrating.

Anyone who believes Democrats own exclusive opposition to the America First principles are completely ignoring the deliberate construct of the republican party.  There are just as many -if not more- natural enemies within the Republican apparatus as there are within the Democrat group. “America-First” is antithetical to the UniParty.

The frustration amid the MAGA community is valid.  Everything about it is righteous.  The mechanisms that run the system in DC must be deconstructed if we are to win the battles and the war against this massive enemy.  We have the largest coalition of American patriots on our side; however, there are only a handful of representatives willing to confront with the needed ferocity.

Multinationals want control; some call that corporatism…. but the names are moot. Multinationals want control, and capitalism does not allow them control; that is why multinationals do not want capitalism. Multinationals use lobbyists to generate regulations that stall competition.

Multinationals do not want competition; they are, by nature of their interest, anti-capitalists.

This misunderstanding is everywhere.

Most people think when they vote for a federal politician -a House or Senate representative- they are voting for a person who will go to Washington DC and write or enact legislation. This is the old-fashioned “schoolhouse rock” perspective based on decades past.

There is not a single person in congress writing legislation or laws. In modern politics not a single member of the House of Representatives or Senator writes a law, or puts pen to paper to write out a legislative construct. This simply doesn’t happen.

Over the past several decades a system of constructing legislation has taken over Washington DC that more resembles a business operation than a legislative body.

The for-profit groups (mostly multinational corporations) have a purpose in Washington DC to shape policy, legislation and laws favorable to their interests. They have fully staffed offices just like any business would – only their ‘business‘ is getting legislation for their unique interests.

These groups are filled with highly-paid lawyers who represent the interests of the entity and actually write laws and legislation briefs.

In the modern era this is actually the origination of the laws that we eventually see passed by congress. Within the walls of these buildings within Washington DC is where the ‘sausage’ is actually made.  Again, no elected official is usually part of this law origination process.

Almost all legislation created is not ‘high profile’, they are obscure changes to current laws, regulations or policies that no-one pays attention to.  The passage of the general bills within legislation is not covered in media.  Ninety-nine percent of legislative activity happens without anyone outside the system even paying any attention to it.

Once the corporation (multinational) or representative organizational entity has written the law they want to see passed – they hand it off to the lobbyists.

The lobbyists are people who have deep contacts within the political bodies of the legislative branch, usually former House/Senate staff or former House/Senate politicians themselves.

The lobbyist takes the written brief, the legislative construct, and it’s their job to go to congress and sell it.  “Selling it” means finding politicians who will accept the brief, sponsor their bill and eventually get it to a vote and passage.

Corporations (special interest group) write the legislation. Lobbyists take the law and go find politician(s) to support it. Politicians get support from their peers using tenure and status etc. Eventually, if things go according to norm, the legislation gets a vote.

Within every step of the process there are expense account lunches, dinners, trips, venue tickets and a host of other customary financial way-points to generate/leverage a successful outcome. The amount of money spent is proportional to the benefit derived from the outcome.

The important part to remember is that the origination of the entire process is EXTERNAL to congress.

Congress does not write laws or legislation, special interest groups do. Lobbyists are paid, some very well paid, to get politicians to go along with the need of the legislative group. When a House or Senate member becomes educated on the intent of the legislation, they have attended the sales pitch; and when they find out the likelihood of support for that legislation; they can then position their own (or their families) financial interests to benefit from the consequence of passage. It is a process similar to insider trading on Wall Street, except the trading is based on knowing who will benefit from a legislative passage.

When we understand the business of DC, we understand the difference between legislation with a traditional purpose and modern legislation with a financial and political agenda.

If you know a better solution to this mess than repeal of the 17th amendment, I am all ears.

If, as the constitution outlined, the Senate were still a place where all legislation required a 2/3 majority for passage; and if, as the constitution outlined, the Senate were a body filled with representatives selected by State Houses instead of popular election – then perhaps Senators could not be purchased by multinational interests.  Alas it is not.

Passage of the 17th amendment took away the very intentional roadblock of the Republican framework that Jefferson spoke of when he called it a saucer to cool the hot emotional tea of short-sighted legislation.  The constitution outlined consent as “two-thirds” (66), which was progressively watered down to become “three-fifths” (60) as the majority rule; and substantively, as it now stands according to democrats objectives, one-half plus one (51).

We are on the precipice and the GOP operate as if the constitution burning can be restored if they just reach across the aisle more.

.

o Our Readers in China – Happy New Year


Armstrong Economics Blog/China Re-Posted Feb 13, 2021 by Martin Armstrong

The Ox is the second of all zodiac animals. According to one myth, the Jade Emperor said the order would be decided by the order in which they arrived to his party. The Ox was about to be the first to arrive, but Rat tricked Ox into giving him a ride. Then, just as they arrived, Rat jumped down and landed ahead of Ox. Thus, Ox became the second animal.

From a cyclical perspective, these are years that do correspond to important shifts in trends. The year 1913 was the year of the Ox when both the income tax and the Federal Reserve were created. (125 was the year the bull market really began to take off and real estate was the first to peak 2 years later. Of court 1949 was the first currency devaluation under Bretton Woods. Even 1961 was Kennedy election, 1973 OPEC, 1985 peak in dollar birth of G5, 1997 Asia Currency Crisis, 2009 bottom in the 2007 Financial Crisis, and now 2021 looks to be shaping up as a disaster and Biden takes control. The next will be 2033 one year after our model peaks in 2032.

President Trump Highlights Potential for Chinese Involvement in SolarWinds Orion Cyber Intrusion


Posted originally on The Conservative tree house on December 19, 2020 by Sundance

Why would any foreign actor go through all the trouble to rob a bank and yet take nothing?…

This is the metaphor for U.S. officials noticing the backdoor to our national cyber-network was found wide open, and yet not a single organization attached to the SolarWind’s Orion network points to any negative impact other than the existence itself of the originating malware. It just doesn’t add up.

Keep in mind… this “malware” has been in place since May and only recently identified.

DNI John Ratcliffe announced there was “foreign interference” in the election, and while citing Russia, China and Iran the DNI said the report on election security would be delayed. Secretary of State Mike Pompeo points to Russia as the source of the SolarWinds’ intrusion; but there is no specific evidence outlined. Today, following a briefing on the issues President Trump noted it could be Russia, but it could also be China.

There seems to be a coordinated effort to blame Russia by government officials and a host of media groups.  Russia is a favored scapegoat, and given how the media falsely blamed Russia for 2016 election interference/collusion, corporate media carry a self-interest in perpetrating that narrative.

Any suggestion it was *not* Russia is then used to weaponize a Russia-apologist narrative. However, considering most of our institutions have a financial relationship with China, the self-serving hypocrisy of China-apologists carries a particularly deafening tone.

Accepting that no-one really knows, yet, who originated this intrusion, here is a Big Picture notation from the Rebel Alliance:

Due to the widespread use of SolarWinds and the length of time the SolarWinds vulnerability was possibly exploited, this attack could be the full-on equivalent of Pearl Harbor, except in a global scale.

In defending networks, very good cyber defense teams (eg, as with large financial firms and some portions of the US gov), have a good chance of success, primarily through use of extensive measures aimed at prevention and/or early detection.

But, when an attacker gets inside a network for an extended period of time, they typically focus first on becoming “rooted” (ie, they implement numerous alternate backdoors and cleverly hide malware throughout the network such that attacker access may be restored even after detection and cleanup).

Once rooted, an attacker is often extremely difficult to fully remove from the victim’s network, even if the victim completely replaces all hardware and rebuilds his entire network from scratch.

Most less capable victims, and there were potentially hundreds or thousand of direct and indirect victims in this attack, do not even have the capability to rebuild their networks and, hence, have little hope of ever completely eliminating the attacker.

Attackers are not solely interested in removing information in bulk. When large amounts of information are unexpectedly seen leaving a network, this often flags an attack in progress. So, slower and more careful movement through the network is typically seen by highly skilled attackers.

Attacker motivations are highly varied. In government networks, the attacker may wish to spy to learn about foreign agents, for example.

In a commercial network, there are many opportunities for financial gain (eg, knowledge of pending business deals). Some attackers may also wish to implement a longer term ability to physically or logically destroy the victim’s network.

Restoring a destroyed network in a large enterprise is amazingly complex. Many organizations, even those having backup data, could not do it. Even if skilled enough to rebuild, the lost time can potentially destroy the enterprise. If hundreds of firms were destroyed simultaneously, the economic impact could be crippling.

America must now confront the reality that most of its corporate network infrastructure could be entirely at the mercy of a foreign power AND that this situation is unlikely to be reversed anytime soon. This is a blow potentially as powerfully impactful as Covid-19.

I am NOT convinced this attack was perpetrated by Russia, as is being preliminarily alleged, due to the difficulty of reliable attribution. Hardly any evidence has been provided and attribution is notoriously difficult.

The evidence should be collected, the extent of the attack [in terms of the actual versus potential] use of the SolarWinds backdoor to invade Gov networks and US corporations should be determined. It must also be assessed whether the SolarWinds attack facilitated interference in the election.

Critically, it must be determined whether “nuclear worms”, capable of physical or logical network destruction, were implanted anywhere and which are now silently waiting for a signal to activate.

(Personally, if I were an IT manager, I’d be VERY worried for the safety of my Active Directory right now, since sabotage of AD is relatively easy and recovery can be extremely difficult and sometimes impossible, depending on the implementation.)

If this attack is limited to just gov networks and does not include major corporations, the election, or nuclear worms, the gov networks should be cleaned up and an appropriate response delivered to the attacker via our Cyber Defense force.

If the attack included the gov networks and election, interference, the same gov network cleanup is needed. However, the response must be more severe, and I would think should include some level of physical destruction.

If, however, the attack spread additionally to most of the Fortune 500 networks and/or includes nuclear worms, a massive gov initiative to facilitate a cleanup of corporate systems is needed.

After the initial triage, activation of plans for a kinetic response to such an attack must be considered. Eg, if the attack was attributed to China, we must respond forcefully and the response must fully respond to Chinese perceptions of US psychology. So, if China perceives the US a paper tiger, the appropriate response my be to take control of the Three Gorges Dam and open its valves.

In my view, this attack *requires* a FORCEFUL response, not necessarily limited to a cyber delivered response. The attacker must pay a high price based upon scope and severity. To do nothing projects unacceptable weakness. And the thought that US corporate infrastructure might be taken out at will, possibly through nuclear worms, possibly through more direct individualized attacks, is just unacceptable.

Regardless of the response, this attack should be taken as a wakeup call to the country. The risk of a destructive attack could be far higher than previously acknowledged.

I hope this summary is helpful to you in helping others understand the significance of this.

Gordon Chang Provides Some Background on July 2020 U.S. Order to Close Houston Chinese Consulate


Posted originally on The Conservative Tree House on December 19, 2020 by Sundance

On July 21st of this year the United States told China they must close their consulate in Houston, Texas, giving them 72 hours to cease operations and events.

Three days later U.S. federal agents and officials entered the consulate alleging the Chinese government was engaging in espionage targeting U.S. interests.

The activities of consulate officials in Houston “are a microcosm, we believe, of a broader network of individuals in more than 25 cities that network is supported through the consulates here,” a US Justice Department official said Friday. “Consulates have been giving individuals in that network guidance on how to evade [and] obstruct our investigation. And you can infer from that the ability to task that [a] network of associates nationwide.”

In an interesting interview a few days ago, Gordon Chang, expanded on the operation that was taking place from within that consulate. (H/T Cari Kelemen)  WATCH (prompted):

What Chang outlines is in alignment with what Trump officials have cited as ongoing malign activity by the Chinese Communist Party (CCP), and speaks to a larger intent by Beijing to influence the 2020 election.

If we overlay what we have witnessed and discussed for the past several years as the Trump administration has tackled the China issues head-on, we can see how our nation has approached an inflection point toward Beijing.

Indeed the larger global community is now aware of a vast network of CCP officials that have infiltrated all systems, processes and institutions of western interests.  The panda mask of China has dropped and now we see the true extent of the dragon tentacles.

Recent reporting on the scale of this influence was ignored by U.S. media, in part due to their financial alignment.  Additionally, the aspects of Hunter and Joe Biden engaging for personal affluence with the Chinese government stands as a remarkable example of the cunning nature of Beijing’s strategy.

Senator Dianne Feinstein with a CCP spy in her office for almost three decades.  House Intelligence Committee member Eric Swalwell having a long-term relationship with another Chinese spy amid recent headlines.  Various academic institutions compromised by Chinese operatives and the theft of intellectual property.  The scale of what China was executing is still unknown as more comes forth each day.

Into this mix we now have a more substantive understanding over how China was influencing U.S. politics; and, as we see in the Houston consulate example, how Beijing was fomenting strife in advance of the November 2020 election as part of a larger plan to install and support U.S. politicians aligned with their interests.

America-First is antithetical to the long-term goals and objectives of the communist Chinese regime.  This was always evident in the way Beijing responded to the trade and economic policies of President Donald Trump.

Ultimately the global battle between the Red Dragon (CCP, Beijing) and President Trump is at the root of the concerted effort to remove/defeat him from office.  CTH has discussed this confrontation at length since the first shots were fired.

U.S. President Trump, representing economic nationalism, stood against China and was winning in the economic war despite the interference from Wall Street and U.S. media.

United Nations Handing over Names of Dissents to China


Armstrong Economics Blog/Corruption Re-Posted Oct 28, 2020 by Martin Armstrong

The United Nations internal ethics investigation has agreed that the U.N. Human Rights Office approved handing over the names of Uighur activists to China and the excuse really makes you wonder do they think we are just all total morons? They are handing over the names of these dissents because they were “primarily interested in good relations” with Beijing. I cannot stress enough that they are doing everything in their power to try to bring China into the climate dictatorship.

The wholesale destruction of small businesses that appear to be running around 30%+ in London, major cities in Europe, and in the blue Democratic states in the USA. Here in Florida, I would put it at about 5% or less in my area. This raises a SERIOUS question. There is no possible way cities like London or New York will survive as they have destroyed so much of their small businesses that their tax revenue will collapse. They are counting on a new future where there is no debt and they get whatever money they need to pay all bills.

We have been shown a leak from the Canadian government which we CANNOT VERIFY is real. Nonetheless, it outlines a communist takeover that follows the script put out by Klaus Schwab and his World Economic Forum. It says all your debts will be forgiven but in return, you will own nothing. They have lowered interest rates to the point that all pensions will fail. It seems that the only way these people can deal with the collapse of socialism is to move to communism. All of the mainstream media are now pushing this agenda. Just look at TIME Magazine.

I have worked with governments around the world. NEVER would they be proactive for they cannot win an election by preventing something that might happen. They have always preferred crisis and then declared they will get the guy that caused it.

Secretary Wilbur Ross Discusses Tech and Structural Confrontation with Beijing -WeChat and TikTok…


When Commerce Secretary Wilbur Ross appears… PAY ATTENTION.  In this interview Secretary Ross outlines an announcement today [LINK HERE] about the U.S. will block Chinese owned WeChat, and additional security measures against TikTok.

COMMERCE – […] While the threats posed by WeChat and TikTok are not identical, they are similar. Each collects vast swaths of data from users, including network activity, location data, and browsing and search histories. Each is an active participant in China’s civil-military fusion and is subject to mandatory cooperation with the intelligence services of the CCP. This combination results in the use of WeChat and TikTok creating unacceptable risks to our national security. (more)

Additionally, Secretary Ross discusses sector-specific relief for the airline industry and U.S. farmers. On the farmer side we should all remember any confrontation with Beijing could lead to China pulling back from purchase agreements. China cannot feed itself and is dependent on imported food products, so the scale of any pull-back is not known.

DETAILS – In response to President Trump’s Executive Orders signed August 6, 2020, the Department of Commerce (Commerce) today announced prohibitions on transactions relating to mobile applications (apps) WeChat and TikTok to safeguard the national security of the United States.

 

The Chinese Communist Party (CCP) has demonstrated the means and motives to use these apps to threaten the national security, foreign policy, and the economy of the U.S. Today’s announced prohibitions, when combined, protect users in the U.S. by eliminating access to these applications and significantly reducing their functionality.

“Today’s actions prove once again that President Trump will do everything in his power to guarantee our national security and protect Americans from the threats of the Chinese Communist Party,” said U.S. Department of Commerce Secretary Wilbur Ross. “At the President’s direction, we have taken significant action to combat China’s malicious collection of American citizens’ personal data, while promoting our national values, democratic rules-based norms, and aggressive enforcement of U.S. laws and regulations.”

While the threats posed by WeChat and TikTok are not identical, they are similar. Each collects vast swaths of data from users, including network activity, location data, and browsing and search histories. Each is an active participant in China’s civil-military fusion and is subject to mandatory cooperation with the intelligence services of the CCP.  This combination results in the use of WeChat and TikTok creating unacceptable risks to our national security.

As of September 20, 2020, the following transactions are prohibited:

  1. Any provision of service to distribute or maintain the WeChat or TikTok mobile applications, constituent code, or application updates through an online mobile application store in the U.S.;
  2. Any provision of services through the WeChat mobile application for the purpose of transferring funds or processing payments within the U.S.

As of September 20, 2020, for WeChat and as of November 12, 2020, for TikTokthe following transactions are prohibited:

  1. Any provision of internet hosting services enabling the functioning or optimization of the mobile application in the U.S.;
  2. Any provision of content delivery network services enabling the functioning or optimization of the mobile application in the U.S.;
  3. Any provision directly contracted or arranged internet transit or peering services enabling the function or optimization of the mobile application within the U.S.;
  4. Any utilization of the mobile application’s constituent code, functions, or services in the functioning of software or services developed and/or accessible within the U.S.

Any other prohibitive transaction relating to WeChat or TikTok may be identified at a future date. Should the U.S. Government determine that WeChat’s or TikTok’s illicit behavior is being replicated by another app somehow outside the scope of these executive orders, the President has the authority to consider whether additional orders may be appropriate to address such activities. The President has provided until November 12 for the national security concerns posed by TikTok to be resolved. If they are, the prohibitions in this order may be lifted.

The notices for these actions will be posted on the Federal Register at approximately 8:45AM EDT on Friday, September 18, 2020.

Background:

On August 6, 2020, President Trump signed Executive Orders (E.O.) 13942, Addressing the Threat Posed by TikTok, and E.O. 13943, Addressing the Threat Posed by WeChat. In the E.O.s, the President determined that the apps capture vast swaths of information from U.S. users, leaving the data vulnerable to CCP access for nefarious purposes.

Commerce, at the Direction of the President, was required to identify transactions within 45 days to protect national security and the private data of millions of people across the country. Today’s announced prohibitions fulfill the President’s direction and mitigate national security risks. (link)