President Trump Highlights Potential for Chinese Involvement in SolarWinds Orion Cyber Intrusion


Posted originally on The Conservative tree house on December 19, 2020 by Sundance

Why would any foreign actor go through all the trouble to rob a bank and yet take nothing?…

This is the metaphor for U.S. officials noticing the backdoor to our national cyber-network was found wide open, and yet not a single organization attached to the SolarWind’s Orion network points to any negative impact other than the existence itself of the originating malware. It just doesn’t add up.

Keep in mind… this “malware” has been in place since May and only recently identified.

DNI John Ratcliffe announced there was “foreign interference” in the election, and while citing Russia, China and Iran the DNI said the report on election security would be delayed. Secretary of State Mike Pompeo points to Russia as the source of the SolarWinds’ intrusion; but there is no specific evidence outlined. Today, following a briefing on the issues President Trump noted it could be Russia, but it could also be China.

There seems to be a coordinated effort to blame Russia by government officials and a host of media groups.  Russia is a favored scapegoat, and given how the media falsely blamed Russia for 2016 election interference/collusion, corporate media carry a self-interest in perpetrating that narrative.

Any suggestion it was *not* Russia is then used to weaponize a Russia-apologist narrative. However, considering most of our institutions have a financial relationship with China, the self-serving hypocrisy of China-apologists carries a particularly deafening tone.

Accepting that no-one really knows, yet, who originated this intrusion, here is a Big Picture notation from the Rebel Alliance:

Due to the widespread use of SolarWinds and the length of time the SolarWinds vulnerability was possibly exploited, this attack could be the full-on equivalent of Pearl Harbor, except in a global scale.

In defending networks, very good cyber defense teams (eg, as with large financial firms and some portions of the US gov), have a good chance of success, primarily through use of extensive measures aimed at prevention and/or early detection.

But, when an attacker gets inside a network for an extended period of time, they typically focus first on becoming “rooted” (ie, they implement numerous alternate backdoors and cleverly hide malware throughout the network such that attacker access may be restored even after detection and cleanup).

Once rooted, an attacker is often extremely difficult to fully remove from the victim’s network, even if the victim completely replaces all hardware and rebuilds his entire network from scratch.

Most less capable victims, and there were potentially hundreds or thousand of direct and indirect victims in this attack, do not even have the capability to rebuild their networks and, hence, have little hope of ever completely eliminating the attacker.

Attackers are not solely interested in removing information in bulk. When large amounts of information are unexpectedly seen leaving a network, this often flags an attack in progress. So, slower and more careful movement through the network is typically seen by highly skilled attackers.

Attacker motivations are highly varied. In government networks, the attacker may wish to spy to learn about foreign agents, for example.

In a commercial network, there are many opportunities for financial gain (eg, knowledge of pending business deals). Some attackers may also wish to implement a longer term ability to physically or logically destroy the victim’s network.

Restoring a destroyed network in a large enterprise is amazingly complex. Many organizations, even those having backup data, could not do it. Even if skilled enough to rebuild, the lost time can potentially destroy the enterprise. If hundreds of firms were destroyed simultaneously, the economic impact could be crippling.

America must now confront the reality that most of its corporate network infrastructure could be entirely at the mercy of a foreign power AND that this situation is unlikely to be reversed anytime soon. This is a blow potentially as powerfully impactful as Covid-19.

I am NOT convinced this attack was perpetrated by Russia, as is being preliminarily alleged, due to the difficulty of reliable attribution. Hardly any evidence has been provided and attribution is notoriously difficult.

The evidence should be collected, the extent of the attack [in terms of the actual versus potential] use of the SolarWinds backdoor to invade Gov networks and US corporations should be determined. It must also be assessed whether the SolarWinds attack facilitated interference in the election.

Critically, it must be determined whether “nuclear worms”, capable of physical or logical network destruction, were implanted anywhere and which are now silently waiting for a signal to activate.

(Personally, if I were an IT manager, I’d be VERY worried for the safety of my Active Directory right now, since sabotage of AD is relatively easy and recovery can be extremely difficult and sometimes impossible, depending on the implementation.)

If this attack is limited to just gov networks and does not include major corporations, the election, or nuclear worms, the gov networks should be cleaned up and an appropriate response delivered to the attacker via our Cyber Defense force.

If the attack included the gov networks and election, interference, the same gov network cleanup is needed. However, the response must be more severe, and I would think should include some level of physical destruction.

If, however, the attack spread additionally to most of the Fortune 500 networks and/or includes nuclear worms, a massive gov initiative to facilitate a cleanup of corporate systems is needed.

After the initial triage, activation of plans for a kinetic response to such an attack must be considered. Eg, if the attack was attributed to China, we must respond forcefully and the response must fully respond to Chinese perceptions of US psychology. So, if China perceives the US a paper tiger, the appropriate response my be to take control of the Three Gorges Dam and open its valves.

In my view, this attack *requires* a FORCEFUL response, not necessarily limited to a cyber delivered response. The attacker must pay a high price based upon scope and severity. To do nothing projects unacceptable weakness. And the thought that US corporate infrastructure might be taken out at will, possibly through nuclear worms, possibly through more direct individualized attacks, is just unacceptable.

Regardless of the response, this attack should be taken as a wakeup call to the country. The risk of a destructive attack could be far higher than previously acknowledged.

I hope this summary is helpful to you in helping others understand the significance of this.

Gordon Chang Provides Some Background on July 2020 U.S. Order to Close Houston Chinese Consulate


Posted originally on The Conservative Tree House on December 19, 2020 by Sundance

On July 21st of this year the United States told China they must close their consulate in Houston, Texas, giving them 72 hours to cease operations and events.

Three days later U.S. federal agents and officials entered the consulate alleging the Chinese government was engaging in espionage targeting U.S. interests.

The activities of consulate officials in Houston “are a microcosm, we believe, of a broader network of individuals in more than 25 cities that network is supported through the consulates here,” a US Justice Department official said Friday. “Consulates have been giving individuals in that network guidance on how to evade [and] obstruct our investigation. And you can infer from that the ability to task that [a] network of associates nationwide.”

In an interesting interview a few days ago, Gordon Chang, expanded on the operation that was taking place from within that consulate. (H/T Cari Kelemen)  WATCH (prompted):

What Chang outlines is in alignment with what Trump officials have cited as ongoing malign activity by the Chinese Communist Party (CCP), and speaks to a larger intent by Beijing to influence the 2020 election.

If we overlay what we have witnessed and discussed for the past several years as the Trump administration has tackled the China issues head-on, we can see how our nation has approached an inflection point toward Beijing.

Indeed the larger global community is now aware of a vast network of CCP officials that have infiltrated all systems, processes and institutions of western interests.  The panda mask of China has dropped and now we see the true extent of the dragon tentacles.

Recent reporting on the scale of this influence was ignored by U.S. media, in part due to their financial alignment.  Additionally, the aspects of Hunter and Joe Biden engaging for personal affluence with the Chinese government stands as a remarkable example of the cunning nature of Beijing’s strategy.

Senator Dianne Feinstein with a CCP spy in her office for almost three decades.  House Intelligence Committee member Eric Swalwell having a long-term relationship with another Chinese spy amid recent headlines.  Various academic institutions compromised by Chinese operatives and the theft of intellectual property.  The scale of what China was executing is still unknown as more comes forth each day.

Into this mix we now have a more substantive understanding over how China was influencing U.S. politics; and, as we see in the Houston consulate example, how Beijing was fomenting strife in advance of the November 2020 election as part of a larger plan to install and support U.S. politicians aligned with their interests.

America-First is antithetical to the long-term goals and objectives of the communist Chinese regime.  This was always evident in the way Beijing responded to the trade and economic policies of President Donald Trump.

Ultimately the global battle between the Red Dragon (CCP, Beijing) and President Trump is at the root of the concerted effort to remove/defeat him from office.  CTH has discussed this confrontation at length since the first shots were fired.

U.S. President Trump, representing economic nationalism, stood against China and was winning in the economic war despite the interference from Wall Street and U.S. media.

United Nations Handing over Names of Dissents to China


Armstrong Economics Blog/Corruption Re-Posted Oct 28, 2020 by Martin Armstrong

The United Nations internal ethics investigation has agreed that the U.N. Human Rights Office approved handing over the names of Uighur activists to China and the excuse really makes you wonder do they think we are just all total morons? They are handing over the names of these dissents because they were “primarily interested in good relations” with Beijing. I cannot stress enough that they are doing everything in their power to try to bring China into the climate dictatorship.

The wholesale destruction of small businesses that appear to be running around 30%+ in London, major cities in Europe, and in the blue Democratic states in the USA. Here in Florida, I would put it at about 5% or less in my area. This raises a SERIOUS question. There is no possible way cities like London or New York will survive as they have destroyed so much of their small businesses that their tax revenue will collapse. They are counting on a new future where there is no debt and they get whatever money they need to pay all bills.

We have been shown a leak from the Canadian government which we CANNOT VERIFY is real. Nonetheless, it outlines a communist takeover that follows the script put out by Klaus Schwab and his World Economic Forum. It says all your debts will be forgiven but in return, you will own nothing. They have lowered interest rates to the point that all pensions will fail. It seems that the only way these people can deal with the collapse of socialism is to move to communism. All of the mainstream media are now pushing this agenda. Just look at TIME Magazine.

I have worked with governments around the world. NEVER would they be proactive for they cannot win an election by preventing something that might happen. They have always preferred crisis and then declared they will get the guy that caused it.

Secretary Wilbur Ross Discusses Tech and Structural Confrontation with Beijing -WeChat and TikTok…


When Commerce Secretary Wilbur Ross appears… PAY ATTENTION.  In this interview Secretary Ross outlines an announcement today [LINK HERE] about the U.S. will block Chinese owned WeChat, and additional security measures against TikTok.

COMMERCE – […] While the threats posed by WeChat and TikTok are not identical, they are similar. Each collects vast swaths of data from users, including network activity, location data, and browsing and search histories. Each is an active participant in China’s civil-military fusion and is subject to mandatory cooperation with the intelligence services of the CCP. This combination results in the use of WeChat and TikTok creating unacceptable risks to our national security. (more)

Additionally, Secretary Ross discusses sector-specific relief for the airline industry and U.S. farmers. On the farmer side we should all remember any confrontation with Beijing could lead to China pulling back from purchase agreements. China cannot feed itself and is dependent on imported food products, so the scale of any pull-back is not known.

DETAILS – In response to President Trump’s Executive Orders signed August 6, 2020, the Department of Commerce (Commerce) today announced prohibitions on transactions relating to mobile applications (apps) WeChat and TikTok to safeguard the national security of the United States.

 

The Chinese Communist Party (CCP) has demonstrated the means and motives to use these apps to threaten the national security, foreign policy, and the economy of the U.S. Today’s announced prohibitions, when combined, protect users in the U.S. by eliminating access to these applications and significantly reducing their functionality.

“Today’s actions prove once again that President Trump will do everything in his power to guarantee our national security and protect Americans from the threats of the Chinese Communist Party,” said U.S. Department of Commerce Secretary Wilbur Ross. “At the President’s direction, we have taken significant action to combat China’s malicious collection of American citizens’ personal data, while promoting our national values, democratic rules-based norms, and aggressive enforcement of U.S. laws and regulations.”

While the threats posed by WeChat and TikTok are not identical, they are similar. Each collects vast swaths of data from users, including network activity, location data, and browsing and search histories. Each is an active participant in China’s civil-military fusion and is subject to mandatory cooperation with the intelligence services of the CCP.  This combination results in the use of WeChat and TikTok creating unacceptable risks to our national security.

As of September 20, 2020, the following transactions are prohibited:

  1. Any provision of service to distribute or maintain the WeChat or TikTok mobile applications, constituent code, or application updates through an online mobile application store in the U.S.;
  2. Any provision of services through the WeChat mobile application for the purpose of transferring funds or processing payments within the U.S.

As of September 20, 2020, for WeChat and as of November 12, 2020, for TikTokthe following transactions are prohibited:

  1. Any provision of internet hosting services enabling the functioning or optimization of the mobile application in the U.S.;
  2. Any provision of content delivery network services enabling the functioning or optimization of the mobile application in the U.S.;
  3. Any provision directly contracted or arranged internet transit or peering services enabling the function or optimization of the mobile application within the U.S.;
  4. Any utilization of the mobile application’s constituent code, functions, or services in the functioning of software or services developed and/or accessible within the U.S.

Any other prohibitive transaction relating to WeChat or TikTok may be identified at a future date. Should the U.S. Government determine that WeChat’s or TikTok’s illicit behavior is being replicated by another app somehow outside the scope of these executive orders, the President has the authority to consider whether additional orders may be appropriate to address such activities. The President has provided until November 12 for the national security concerns posed by TikTok to be resolved. If they are, the prohibitions in this order may be lifted.

The notices for these actions will be posted on the Federal Register at approximately 8:45AM EDT on Friday, September 18, 2020.

Background:

On August 6, 2020, President Trump signed Executive Orders (E.O.) 13942, Addressing the Threat Posed by TikTok, and E.O. 13943, Addressing the Threat Posed by WeChat. In the E.O.s, the President determined that the apps capture vast swaths of information from U.S. users, leaving the data vulnerable to CCP access for nefarious purposes.

Commerce, at the Direction of the President, was required to identify transactions within 45 days to protect national security and the private data of millions of people across the country. Today’s announced prohibitions fulfill the President’s direction and mitigate national security risks. (link)