Covid19 – The Coverup Of the Century – Documentary

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Zooming In’s one-hour documentary movie follows investigative reporter Simone Gao’s inquiry into critical questions about the pandemic: What did the Chinese Communist leadership do at the early stages of the outbreak? What significant truth have they concealed from the world, and why did they do that?

The documentary also casts light on why the Chinese Communist Party was not held accountable for the past 40 years and what can be learned from the western world’s history of dealing with Communist China.

Sharri Markson – WHO ‘As Culpable’ As China In Allowing COVID-19 To spread

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

ky News host Sharri Markson says the World Health Organisation bears as much responsibility for the COVID-19 pandemic as China as the organisation backflips over the Wuhan lab leak theory.

“The WHO … their role in exacerbating the spread of COVID-19 globally just cannot be overstated,” Ms Markson told Sky News. “They are as culpable in allowing this virus to spread in my view, as China is.”

Flood Explosion & Land Subsidence In China, Natural Or Man-Made Disaster?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Extremely heavy rain in #Henan province, #flood caused explosion, people trapped and suffocated in the subway, land subsided. Is this a natural disaster or is it caused by two many reservoirs built in China to serve as cash cows?

China’s Henan Province was hit by “historic” heavy rains on July 20. The subway in Zhengzhou, the capital of the province, was submerged in the floods. The city remains in a state of paralysis.

Floods in the urban area are surging and up to 1.2 million Chinese citizens have been displaced by the water. Chinese officials have admitted to 25 deaths, though the actual count may be much higher.

Will China Invade Taiwan? An Interview With June Teufel Dreyer

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Will China Invade Taiwan? An Interview with June Teufel Dreyer China has ratcheted up its harassment of Taiwan by routinely sending military aircrafts to Taiwan’s air space. Is it really contemplating taking Taiwan by force? Is Taiwan the most dangerous place on earth?

Continue reading “Will China Invade Taiwan? An Interview With June Teufel Dreyer”

Video – Rand Paul Threatens Fauci With Criminal Referral

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

‘Outnumbered’ panel discusses the heated exchange between Senator Rand Paul and Dr. Fauci and the White House’s messaging on vaccinations.

Dr Anthony Fauci Used ‘Strawman’ Argument In Feud With Rand Paul

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sky News host Rowan Dean says Dr Anthony Fauci used a “strawman” argument against Senator Rand Paul during a Senate Health Committee hearing about the US federal COVID-19 response.

It comes after Senator Paul questioned Dr Fauci about the role the National Institutes of Health played in funding gain-of-function research in Wuhan. Dr Fauci responded to Senator Paul, saying “you are implying that what we did was responsible for the deaths of individual, I totally resent that, and if anybody is lying here Senator it is you”.

According to Mr Dean, Dr Fauci used a “very clever construction of a straw man”. “These two have been sparring over this issue and the stakes could not be higher,” he told Sky News host Rita Panahi. “Basically, what Rand Paul is saying is … Dr Fauci was secretly funding the Wuhan lab, at a time when he had said America would no longer be involved in that.”

After Covid19 US Institutions Are Warned – 5.000 Chinese Seeds – “Most Poisonous” – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page 1 of China Seeds KORA
Continue reading “After Covid19 US Institutions Are Warned – 5.000 Chinese Seeds – “Most Poisonous” – Original Document”

4 Chinese Nationals Charged For Hacking US Companies – China Accused Of Widespread Cybercrime

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Four Chinese nationals have been charged for targeting dozens of companies, universities and government agencies in the United States and abroad. This action comes right in the heels of the United States and its allies publicly accusing China of a global cyber espionage campaign.

DJI Likely Providing US Critical Infrastructure & Data To China – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Looking for China's spies - BBC News
Page 1 of ICE DJI China
Continue reading “DJI Likely Providing US Critical Infrastructure & Data To China – Original Document”

Sky – ‘Enough Is Enough’: China ‘Named And Shamed’ By 30 Nations Over Cyber Attacks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Assistant Defence Minister Andrew Hastie says it’s a “very sound development” that 30 nations came together and “named and shamed” China for cyber attacks on Microsoft.

This comes after Western world allies including Australia, the United States and Japan joined forces to directly blame the communist superpower for a major cyber attack on Microsoft software. The attack exploited weaknesses in Microsoft Exchange software which impacted thousands of computers and networks across the world.

“I think it’s a very sound development that we’ve named and shamed China behind these hacks – because it’s got to stop,” Mr Hastie told Sky News host Peta Credlin. “We have boundaries in our normal everyday relationships and so too have boundaries on the international stage. “And this is 30 nations saying to China ‘enough is enough – no more’.”

China Threatens To ‘Nuke Japan Off The Face Of The Earth’ As Taiwan Conflict Erupts

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

CHINA has threatened to launch nuclear missiles atJapan on the eve of the Olympic Games as tensions of Taiwan threaten all-out war. China has vowed to launch a nuclear war with Japan if Tokyo intervenes to protect Taiwan.

Beijing made the threat as Japan prepares to host the 2021 Olympic Games, the East Asian superpowers have been in conflict over the status of Taiwan. …

WHO – Study On The Origins Of Covid19 – Terms Of References For The Chinese Part – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page 1 of WHO Wuhan Agenda
Continue reading “WHO – Study On The Origins Of Covid19 – Terms Of References For The Chinese Part – Original Document”

Exclusive – Satellite Photos Show Cover Up Actions At The Wuhan Lab – Original Images

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page 1 of Wuhan
Continue reading “Exclusive – Satellite Photos Show Cover Up Actions At The Wuhan Lab – Original Images”

Revealed – China Crisis – Xi Jinping’s Regime ‘Could Soon Collapse’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

XI JINPING could soon be toppled, according to a leading China analyst, who revealed that Beijing is much more fragile economically and militarily “than it lets on”. Chinese leader Xi Jinping could soon be toppled and the Chinese Communist Party could “collapse,” according to a senior China analyst Paul Monk.

China’s Top Spy Head Dong Jinwei Did Defect!? China Lied About Him

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The world is looking for one man: #DongJingwei, vice minister of the Ministry of State Security for the #Chinesegovernment. Dong revealed #US companies and officials helped hide the #virusorigin; Dong Jingwei also revealed the Chinese government has sensitive information and photos of Hunter Biden. U.S. officials from multiple agencies have denied the rumor or indicated that the defection story was inaccurate, but did not confirm the whereabouts of Dong Jingwei.

#China claims he still resides there and serves in his post, offering meeting minutes and a brief video alleged to be from a meeting he recently attended. Online news sources, including RedState, say differently. Claiming that Dong defected in mid-February under the pretense of visiting his daughter, who is attending college in California. Although Zooming In can not independently confirm Dong Jingwei’s defection and his current residence in the U.S.. Based on our own research, however, we have concluded that it is very likely that the China Central Television’s (#CCTV) report about Dong Jingwei attending a meeting in China was fake. Simone Gao will tell you why in today’s video.

China-US Relations In The Eyes Of The Chinese Communist Party – An Insider’s Perspective

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Since the opening of diplomatic relations with China in 1972, the American strategy of engagement, however well intentioned, has been deeply naïve.

While accepting America’s efforts to facilitate their country’s modernization, China’s leaders have worked to restrict any liberal effects on their political system. Now that China is strong, the Chinese Communist Party no longer believes that it must accommodate American concerns about its human rights record, military modernization, and foreign policy.

Continue reading “China-US Relations In The Eyes Of The Chinese Communist Party – An Insider’s Perspective”

The Biggest Myth of China’s Economy: Why Doesn’t the Real Estate Bubble Pop? | Zooming In China

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Would you enter a lottery where the grand prize was a chance for you to spend $1.5 million? Or pay an extra $30,000 at closing, without protest or pause, when the seller suddenly raises the asking price? Would you risk it all on real estate knowing it would take 40 years to pay off a 750 square foot apartment?

The answer for those living in #China ’s premier cities, including real estate hotspots in #Beijing, #Shanghai, #Shenzhen and #Guangzhou, is yes. In this episode of #ZoomingInChina #Teatime, #SimoneGao analyzes the biggest myth of China’s economy:

Why doesn’t that #realestate bubble pop? And who is the biggest beneficiary of that bubble?

Xi Jinping’s Recent Speech ‘Points To An Ever More Controlling’ Chinese Communist Party

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Chinese President Xi Jinping’s speech, which marked the 100th anniversary of the CCP, all but “killed off the idea” that China under its current leadership will ever liberalise, says Sky News host Sharri Markson.

“Instead it points to an even more controlling Communist Party,” Ms Markson said. In an address to the nation, President Xi Jinping vowed to “smash” any attempts at Taiwanese independence and said he would work to achieve a complete “reunification” of the country.

Ms Markson spoke to the Australian Strategic Policy Institute’s Peter Jennings about the unfolding issues.

Chinese Naval Base in Djibouti and Chinese Imperialism In The Horn Of Africa

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Since the establishment of the base, there have been numerous accusations, made mainly by US administration officials, that it is an attempt of an expansion into the Indian Ocean. In April 2021, US Africa Command commander Gen. Stephen Townsend indicated during a hearing before Congress that China is expanding the port to accommodate aircraft carriers in the future. However, according to the Communiqué of the Chinese government, the base is intended to fulfill international obligations by providing humanitarian aid, supporting Chinese peacekeeping operations in Africa, assisting in ongoing anti-piracy missions as well as maintaining peace and stability in the region.

Continue reading “Chinese Naval Base in Djibouti and Chinese Imperialism In The Horn Of Africa”

KGB – Agent Yuri Bezmenov – Subversion Of The Free World Press

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Soviet (and CCP) Subversion of the Free World Press, 1984 Complete Interview – Yuri Bezmenov Yuri Bezmenov: The Life and Legacy of the Influential KGB Informant Who Defected to the West: https://amzn.to/3tdCkdi

Yuri Alexandrovich Bezmenov, was a Soviet journalist for RIA Novosti and a former PGU KGB informant who defected to Canada. After being assigned to a station in India, Bezmenov eventually grew to love the people and the culture of India.

Xi Jinping: China’s President And His Quest For World Power Nr 1

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

China’s President Xi Jinping is a force to be reckoned with. As leader of the Communist colossus, he commands the world’s attention, but who is China’s strongman and what is his agenda?

Born into the privileged life of a princeling, banished to poverty in the countryside during a political purge, his early life formed and framed his views on power and control. His rise up the political ladder was propelled by party connections and an advantageous celebrity marriage.

As he rose through the party ranks, he carefully crafted his image. Today it’s a full-blown cult of personality featuring compulsory lessons in “Xi Jinping Thought”. China specialists say that the country has already fundamentally re-written the international rule book.

The question is, how will the rest of the world respond?

Blaxland – CCP Centenary Parade ‘Eerily Reminiscent’ Of Nuremberg Rally

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The ANU’s Professor John Blaxland says China’s parade for the 100th anniversary of the Communist Party of China was “eerily reminiscent” of Nuremberg-type rallies.

“The parade that we saw for the anniversary, eerily reminiscent of Nuremberg-type rallies with goose-stepping parades and fists of declaration of smashing heads – it makes Peter Dutton looks positively pacifist,” he told Sky News host Catherine McGregor.

“The talk of beating drums of war really makes it very very clear that the drums aren’t being beaten here, they’re being beaten in Beijing.”

Video – China Could Gain Dominance With This One ‘Key’ Thing – Fauci Allegedly Lied to Congress About The Canceled $370k Grant To “The” Chinese Institute

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 4

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 4”

Sharri Markson – Official 2011 Chinese Government Submission Discusses ‘Weaponising Specific Viruses To Target Races’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

An official Chinese government document – submitted to the United Nation’s Biological Weapons Convention in 2011 – discusses “weaponising specific viruses to target races,” according to Sky News host Sharri Markson.

“It is a shocking and grotesque area of bioresearch,” Ms Markson said. She said it was part of the warning which was included in the government’s formal submission to the United Nation’s Biological Weapons Convention in 2011.

Ms Markson said the documents show that the Chinese government took concerns about a potential lab leak extremely seriously. “So seriously they said a lab leak involving virus research could place the whole of mankind in great danger”. “China even says that biotechnology research means there are difficulties complying with the biological weapons convention”. “There is no evidence that COVID-19 was a biological weapon, nor that China has carried out a biological attack,” Ms Markson said.

“The significance of this is that the Chinese government included a discussion about these threats in its official submission to the United Nations Biological Weapons Convention as relevant issues that could impact on compliance with the Convention moving forward”. “Nothing in this document is more significant than China’ serious concerns about a laboratory accident and the threat that this could pose to mankind. “China and its cronies have repeatedly insisted over the past 19 months that the possibility of a lab leak in Wuhan is a conspiracy theory. This is a lie.” Ms Markson spoke to the former lead investigator who spearheaded a taskforce for the US government into the origins of COVID-19 – David Asher – about the developments.

Chinese Defector Dong Jingwei

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Rumors of a top Chinese counterintelligence official defecting to the United States continue to swirl. Sources are suggesting he may be in U.S. custody revealing secrets about Chinese spying operations and the Wuhan lab leak.​

🔵 Chinese twitter investigates a top Chinese counterintelligence official called Dong Jingwei who is rumored to have defected to the United States in February 2021. ​

🔵 Spytalk.co explains the murmurings taking place in Chinese media and elsewhere, which suggests Jingwei, longtime official in China’s Ministry of State Security (MSS) is in the United States. ​

🔵 Chinese twitter users probe Chinese state media releases, which appear to be covering up for the defection. ​

🔵 RedState.com’s Jennifer Van Laar reveals sources confirm the rumors on Chinese twitter. ​

🔵 RedState reveals Jingwei may be releasing a trove of highly- sensitive intelligence information, including pathogenic studies of SARS-CoV-2 and the extent of Chinese infiltration into U.S. Assets.​

CSIRO ‘Worked With Coronaviruses & Bats’ With Chinese Military Scientists

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nationals Senator Matt Canavan says “it became clear the CSIRO has worked with coronaviruses and with bats” in gain-of-function research conducted with counterparts from the Wuhan Institute of Virology. “Now there are credible allegations that the coronavirus that we’re still living with came from China, and it was potentially made in China and it would appear that at least if that is the case, our government agencies like the CSIRO have at least been involved in these processes,” he told Sky News host Chris Kenny. “There was, at least, some misleading evidence in my view given to the Senate a few weeks ago, it certainly wasn’t fulsome. “When we got answers back from the CSIRO on notice, it became clear that the CSIRO has worked with coronaviruses, has worked with bats, with scientists from the Wuhan Institute of Virology. “I really think the government needs to look hard about whether this sort of research should continue.”

Source – Defector Said Virus Was Part of BioWeapon Program

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

According to a source, the Defense Intelligence Agency has kept the CCP #defector #DongJingwei for four months under protective custody. #ZoomingIn with SimoneGao ’s Simone Gao conducted an interview with Republican National Committeeman Solomon Yue who has information about DongJingwei. The State Department, White House, and other intelligence agencies just got to know about this in the recent weeks. The source confirmed Dong’s Identity as Deputy Minister of Public Security; Dong revealed U.S. companies and officials help hide the virus origin; DongJingwei also revealed the Chinese government has sensitive information and photos of Hunter Biden. We will post that part of the interview on our membership website: Zoomingin.tv.

Sky News – Top Chinese Spy Catcher Dong Jinwei Reportedly Defects To US ‘To Offer Secrets’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sky News host Andrew Bolt says recent reports have circulated that China’s “top spy catcher” has defected to the United States – supposedly willing to “offer the US secrets” about how coronavirus “did escape from a lab in Wuhan”. Mr Bolt also said the spy, Dong Jingwei, would “supposedly” give the US names of Chinese spies. “Now, if this is true, it is absolutely huge,” Mr Bolt said.


WENIGER ANZEIGEN


Wuhan Bat Video Shows Much Of Pandemic Origin Information Was ‘Chinese Disinformation’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sky News host Sharri Markson says exclusive footage she revealed which proves live bats were kept at the Wuhan Institute of Virology shows much of what the world has been told about the origin of the pandemic was “Chinese disinformation”.

Ms Markson told Fox News in the interview that Beijing’s disinformation was then “propagated” by many who were “compromised”. “It shows that much of what we’ve been told about the origin of the pandemic from the very beginning was Chinese disinformation which was then propagated by many people who had been working in conjunction with the Wuhan Institute of Virology who are compromised, who had extreme conflicts of interest,” she said.

Ms Markson scorched the WHO team which visited Wuhan earlier this year to investigate the origin of the pandemic. “People like Peter Daszak insisted that it was a conspiracy theory – he used the term in a tweet from December 2020 – that it was a conspiracy theory to say that there were bats in the lab,” she said.

“He’s an official WHO, World Health Organisation, investigator who went into Wuhan to supposedly investigate the origins of the virus earlier this year and it was completely false. “This new footage shows that there were bets being kept in the Wuhan Institute of Virology and it’s something Peter Daszak has had to admit, has had to correct just this month.

“There’s so much that he didn’t and the WHO team didn’t ask when they went into Wuhan.” Ms Markson said the WHO team failed to even ask what happened to a colossal database of coronaviruses at the lab. “They didn’t ask if there were bats at the laboratory, they didn’t ask where the virus database was, this is such a crucial thing, the virus database with some 15,000 or 17,000 bat samples suddenly disappeared from the internet in September 2019 just prior to the outbreak of COVID-19,” she said.

“People like Peter Daszak who went into to supposedly investigate this were riddled with conflicts. “Anthony Fauci, as well, should not be advising the president on the origin of coronavirus given it was his organisation that funnelled money through a subgrant through to the Wuhan Institute of Virology. “He can issue all the denials that he likes. The scientific papers say that they were funded with NIH.”

Video – Sharri Markson – Lab Leak or Natural Emergence: What Really Happened in Wuhan?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sharri Markson joins Gerard Henderson and The Sydney Institute members to discuss her new book What Really Happened in Wuhan?

Sky News – Sharri Markson Has “Uncovered The Greatest Scientific Scandall Of All Time”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nationals Senator Matt Canavan says he thinks Sharri Markson has “uncovered the greatest scientific scandal of all time”. Mr Canavan reflected on some of the recent work Sky News host Sharri Markson has been undertaking in investigating and revealing details relating to the origins of COVID-19. “Millions of people have died and they deserve, their families deserve, answers about how this happened and how can we make sure this does not happen again,” Mr Canavan said. “We need answers here, we need to get to the bottom of what happened here,” Mr Canavan told Sky News host Paul Murray.

Highlights – How Fauci Tricked And Framed The Investigation To Avoid The Lab Made Origin Theory Of Covid19 – Original Emails

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Did America's NIAID fund 'COVID' research in China's Wuhan? Dr Fauci says  'preposterous'

  • February 5-6, 2020 (000239) – Fauci asked to recommend names for WHO group with the broad mission to “look at the origins and evolution of 2019n-CoV.”  Fauci responds by seeking to reframe the mission in a manner that would only look for natural and not lab made origin.  He does this by restating the mission one to “examine the evolutionary origin of the 2019-nCoV” and later that day as the “coronavirus evolution working group.”
  • February 7, 2020 (000189) – Fauci sent an internal NIAID communication reflecting that it was unlikely that the SARS-CoV-2 virus originated in a wet market.
Continue reading “Highlights – How Fauci Tricked And Framed The Investigation To Avoid The Lab Made Origin Theory Of Covid19 – Original Emails”

WORLD EXCLUSIVE Video – Footage Proves Bats Were Kept In Wuhan Lab

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Wuhan Institute of Virology kept live bats in cages, new footage from inside the facility has revealed, disproving denials from World Health Organisation investigators who claimed the suggestion was a “conspiracy”.

An official Chinese Academy of Sciences video to mark the launch of the new biosafety level 4 laboratory in May 2017 speaks about the security precautions that are in place if “an accident” occurs and reveals there had been “intense clashes” with the French Government during the construction of the laboratory.

The video shows bats being held in a cage at the Wuhan Institute of Virology, along with vision of a scientist feeding a bat with a worm. The 10 minute video is titled “The construction and research team of Wuhan P4 laboratory of Wuhan Institute of Virology, Chinese Academy of Sciences” and features interviews with its leading scientists.

The World Health Organisation report investigating the origin of the pandemic failed to mention that any bats had been kept at the Wuhan Institute of Virology and only its annex referred to animals being housed there. “The animal room in the P4 facility can handle a variety of species, including primate work with SARS-CoV-2,” it states.

A member of the World Health Organisation team investigating the origin of the pandemic in Wuhan, zoologist Peter Daszak said it was a conspiracy to suggest bats were held at the Wuhan Institute of Virology. In one tweet dated December, 2020 he said: “No BATS were sent to Wuhan lab for genetic analysis of viruses collected in the field. That’s now how this science works. We collect bat samples, send them to the lab. We RELEASE bats where we catch them!” In another tweet, dated December 11, 2020, he said: “This is a widely circulated conspiracy theory. This piece describes work I’m the lead on and labs I’ve collaborated with for 15 years. They DO NOT have live or dead bats in them. There is no evidence anywhere that this happened. It’s an error I hope will be corrected.”

This month, Daszak appeared to retract his earlier denials and admitted the Wuhan Institute of Virology may have housed bats but admitted he had not asked them. The Chinese Academy of Sciences video was discovered by researchers investigating the origin of the pandemic who call themselves DRASTIC. Digital archivist “Jesse” found the Chinese Academy of Sciences Video while the group’s co-ordinator, who goes by a pseudonym of “Billy Bostickson” for safety reasons, has long complained evidence bats were housed in the Wuhan laboratories. The video forms part of the investigation for the book “What Really Happened in Wuhan” which is available for pre-order at Amazon and Booktopia. Mr Daszak has not responded to requests for comment.

Peng Wang – The Red Mafia In China

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Concept of Organized Crime in Historical Perspective


Abstract ‘Red Mafia’ is the collective term for corrupt public officials in mainland China, mainly from the criminal justice system, who attempt to monopolise the protection business in the criminal underworld by abusing power. In contemporary mainland China, the Red Mafia has developed into an alternative system of governance that can control organised crime groups, enable them to flourish, and protect them where strong government and effective self-protection associations are absent. The author examines organised crime and corruption by analysing the Wen Qiang case, one of the most famous and widely publicised cases in Chongqing’s latest crime crackdown campaign. Drawing on interview data and extensive published materials, this paper offers a tentative definition of ‘Red Mafia’, develops a typology of organised crime, describes the emergence of the Red Mafia in China, explores how gangsters developed relationships with public officials, suggests why organised crime groups chose the Red Mafia as their preferred protection and enforcement mecha nism, examines patterns of services provided, and explores the differences between the Red Mafia and other Mafia groups.


Continue reading “Peng Wang – The Red Mafia In China”

Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 3

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Fauci funded 'bat-human interface' research in China to avoid an outbreak  in the US | Sky News Australia
Continue reading “Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 3”

Video – “Hiding In Plain Sight”: Ron Johnson Ties Fauci To Gain Of Function Research Funding

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Video – China Funding Human-Animal Hybrids

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Tammy Bruce warns that Democrats blocked measure to prohibit funding of chimera experiments.

“Declassify It”: GOP Senators Demand Wuhan Virology Lab Information Be Released – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In a Senate GOP press conference yesterday, Republicans demanded that information into the Wuhan Institute of Virology and gain of function research be declassified.

Unveiled The GOP-Congress Letter To Fauci – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Unveiled The GOP-Congress Letter To Fauci – Original Document”

Sen. Kennedy – “Fauci Needs To Cut The Crap, This Isn’t About His Feelings” – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Dr. Adrian Zenz – “End the Dominance of the Uyghur Ethnic Group”: Beijing’s Slow Genocide in Xinjiang – Author Manuscript

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Dr. Adrian Zenz – “End the Dominance of the Uyghur Ethnic Group”: Beijing’s Slow Genocide in Xinjiang – Author Manuscript”

Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 2

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

These Savvy Humans Are Saving Bats From Human COVID
Continue reading “Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 2”

Sharri Markson – Bombshell Emails About What Fauci Knew – Fauci Funded Bat-Human Interface Research in China – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Secret U.S. Intelligence Report – China Is Reponsable For Covid19 Outbreak

Become a Patron!
True Information is the most valuable resource and we ask you to give back

China reports rise in Covid-19 cases, Beijing calls for vigilance

Three scientists from China’s Wuhan Institute of Virology got debilitated enough in November 2019 that they looked for clinic care, as per a formerly undisclosed U.S. insight report that could add weight to developing requires a more full test of whether the COVID-19 infection may have gotten away from the research facility.

Continue reading “Secret U.S. Intelligence Report – China Is Reponsable For Covid19 Outbreak”

The Shuidong Connection – Exposing The Global Hub For Illegal Ivory Trades – Original Document

Become a Patron!

True Information is the most valuable resource and we ask you to give back.

China's legal ivory trade is 'dying' as prices fall - China Dialogue

An Environmental Investigation Agency investigation in Mozambique revealed a Chinese-led criminal syndicate which for over two decades has been trafficking ivory from Africa to Shuidong, its hometown in southern China. According to this syndicate, it is just one of about 10 to 20 similar groups originating from Shuidong. Their criminal exploits reveal how their small hometown has become, and remains, the world’s largest hub for ivory trafficking: the group claims up to 80 percent of tusks from poached elephants in Africa pass through Shuidong. China has taken significant steps to close its legal domestic ivory market in the past year. This is a positive move by a country with one of the biggest ivory markets and demonstrates leadership and pragmatism. However, there remain serious questions on the lack of enforcement in China, and abroad, against Chinese nationals deeply involved in the illegal ivory trade, who continue to operate with complete impunity.

Continue reading “The Shuidong Connection – Exposing The Global Hub For Illegal Ivory Trades – Original Document”

TOP SECRET – CIA Report About The Russian Chinese Relations Revealed – Original Document

Become a Patron!

True Information is the most valuable resource and we ask you to give back.

China's Xi Jinping visits 'best friend' Vladimir Putin | Vladimir Putin  News | Al Jazeera
Continue reading “TOP SECRET – CIA Report About The Russian Chinese Relations Revealed – Original Document”

TOP SECRET – U.S. National Security Commission on Artificial Intelligence Presentation On Chinese Tech Landscape – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

NSCAI Report: US Can Gain Leading Edge on AI With This Plan
Continue reading “TOP SECRET – U.S. National Security Commission on Artificial Intelligence Presentation On Chinese Tech Landscape – Original Document”

U.S. Secretary of State – The Elements of the China Challenge – Top Secret Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “U.S. Secretary of State – The Elements of the China Challenge – Top Secret Original Document”

The European Banking Authority, EBA, Hit By Cyberattack Orchestrated by Chinese Spies

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The European Financial Position, EBA, said it has become the latest casualty of a digital assault, which Microsoft said a week ago was organized by Chinese government operatives.

The EBA said that it accepts no information was extricated from the assault on its Microsoft Trade Workers, and that it has now gotten its email foundation.

Continue reading “The European Banking Authority, EBA, Hit By Cyberattack Orchestrated by Chinese Spies”

LETTER FROM STALIN TO CDE. G. APRESOV, CONSUL GENERAL IN URUMQI

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

7 Atrocities Soviet Dictator Joseph Stalin Committed | HowStuffWorksCde. APRESOV!

Sheng Shicai’s letter made a depressing impression on our comrades. Only a provocateur or an hopeless “leftist” having no idea about Marxism could have written it. What could have happened that Sheng, having such an adviser as you, could have written us (me, Molotov, and Voroshilov) such a letter?

We are sending Sheng a suitable letter, but Cde. Svanidze will pass you a copy of our reply.

You should explain to Sheng the meaning of our reply and take steps so that the instructions given in our reply are followed.

I warn that if our instructions are not taken into consideration we will be forced to deny aid to Sheng.

The charter of the Union is not bad, but paragraph five about “equal rights” for women is not suitable for Xinjiang conditions and should be discarded.

Greetings!

I. STALIN.

27 July 1934

[a handwritten version of the above follows]

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

LETTER OF GOVERNOR SHICAI SHENG TO CDES. STALIN, MOLOTOV, AND VOROSHILOV

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sheng Shicai - Wikiwand

CREATOR
SHENG, SHICAI, 1897-1970

SUBJECTS DISCUSSED
Molotov, Vyacheslav M.
Stalin, Joseph, 1879-1953
China–Politics and government–1912-1949
Communism–History–China
Xinjiang Uygur Zizhiqu (China)–History
Sheng, Shicai, 1897-1970
Voroshilov, Kliment Efremovich, 1881-1969
China (Republic)–Foreign relations–Soviet Union
More …
LOCATIONS DISCUSSED
Soviet Union
Xinjiang Uygur Autonomous Region

Archive.

I. Stalin

Top Secret

Translation from Chinese

Continue reading “LETTER OF GOVERNOR SHICAI SHENG TO CDES. STALIN, MOLOTOV, AND VOROSHILOV”

In Tibet China Uses New Forms Of Coerced Labor And Micromanaging

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Before Xinjiang, there was Tibet. Repressive policies tested there between 2012 and 2016 were then applied to the Uighurs and other ethnic minorities in northwestern China: entire cities covered in surveillance cameras, ubiquitous neighborhood police stations, residents made to report on another other.

Continue reading “In Tibet China Uses New Forms Of Coerced Labor And Micromanaging”

CHINESE AUTHORITIES ARRESTED AND DISAPPEARED MY FATHER

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A young Chinese woman in red aims her bow and arrow off screen.

The last time I saw my father was in 2013. We were on our way to Indiana University, where he was scheduled to begin a fellowship. He was arrested before boarding the plane and taken away. A mild-mannered, studious professor of economics, his life’s work was using his influence to promote peaceful coexistence between the Uyghur people—our people—and the Han ethnic majority that rules China. That went against the interest of the Chinese Communist government, and in 2014 they sentenced him to life in prison. The last time I spoke to him was the day before his arrest. I still don’t know if he is even alive—the last time I heard anything of his whereabouts was in 2017.

In many ways, I can identify with the title character in Disney’s Mulan films, based on the ancient Chinese legend. In the story, as China calls up the men from every family to defend against a foreign invasion, Mulan dresses as a boy and fights in the place of her father, who is too old to go himself. As a child growing up in Beijing, I loved the legend and the fun Disney cartoon version produced in 1998. Little did I know that I, like Mulan, would later be fighting for my own father—helping to carry on his work while he is unjustly imprisoned. I hope, like her, to achieve victory by one day gaining my father’s release.

Today, sadly, a new retelling of the Mulan story, once again by Disney, is profiting from the oppression of my people. This live-action version was filmed partly in the Uyghur region—officially known in China as “Xinjiang Uyghur Autonomous Region”—where the Chinese Communist government is holding at least one million members of Turkic ethnic minorities in concentration camps as part of a coordinated genocidal campaign. My father, if he is alive, may be among them—nobody will allow us to visit him, or even tell us where he is.

Continue reading “CHINESE AUTHORITIES ARRESTED AND DISAPPEARED MY FATHER”

Revealed – DHS Fusion Center China Problems

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Over 100 DHS Fusion Center siteswere involved in the recent #BlueLeaks database breach. All of the sites were ultimately hosted on a computer server in a Data Foundry data center in Houston. Data Foundry, also called GigaNews, is a central Texas based operator of several data centers.

Continue reading “Revealed – DHS Fusion Center China Problems”

Exposed – US Prosecutor Indicts Two Chinese For Hacking TBs Of Data

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Chinese cybercriminals hacked companies doing COVID-19 vaccine ...

Continue reading “Exposed – US Prosecutor Indicts Two Chinese For Hacking TBs Of Data”

Revealed – People’s Republic of China Ministry of State Security (MSS) Entrance, Beijing, PRC

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

39°59’20.99″ N 116°17’17.02″ E (Beyond Ramp)

[Image]

[Image]

[Image]

[Image]

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Prohibiting Procurement from Huawei, ZTE, and Other Chinese Companies

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The National Reconnaissance Office (NRO) Acquisition Manual is hereby amended by adding new sub-part N4.21, Prohibition on Contracting for Certain Telecommunications and Video Surveillance Services or Equipment, to implement a provision of the 2019 National Defense Authorization Act prohibiting the procurement and use of covered equipment and services produced or provided by Huawei Technologies Company, ZTE Corporation, Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, and Dahua Technology Company. New provision N52.204-016, Representation Regarding Certain Telecommunications and Video Surveillance Services or Equipment, is prescribed for use in all solicitations in lieu of FAR provision 52.204-24, and new clause N52.204-017, Prohibition on Contracting of Certain Telecommunications and Video Surveillance Services or Equipment, is prescribed for all solicitations and contracts in lieu of FAR clause 52.204-25. These revisions are effective immediately, and will be incorporated into NRO Acquisition Circular 2019-03.

Joint Chiefs of Staff Briefing about China’s “System Attack”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This paper explores the PLA’s theory of victory in modern warfare and its implications for how China plans to fight the United States. It is a primer on the theory’s foundational concepts, and on what the theory reveals about China’s strategic intent and ambitions.

(U) Executive Summary

(U//FOUO/RELIDO) China plans to defeat powerful adversaries by systematically targeting the linkages and nodes that hold an advanced network-centric force together as a cohesive whole. The PLA calls this theory of victory “systems attack and destruction warfare,” hereafter, “system attack. Authoritative PLA doctrine emphasizes importance of system attack as China’s “basic operational method” of warfare. System attack is perhaps best remembered as “the American way of war with Chinese characteristics,” since the PLA developed the concept based on observing U.S. military victories In the 1990s. Some of the PLA’s writings on systems attack are clearly aspirational, but this does not preclude the effectiveness of the approach, and the doctrine shows that the Pl.A is thinking seriously and realistically about how to defeat.an advanced adversary. The requirements of system attack are actively driving PLA reform, acquisitions, operations and training, and the doctrine telegraphs how Chine intends to fight.

(U) China’s Theory of War: “‘Systems Confrontation•

• (U//FOUO/RELIDO) 1 +1>2. Operational Systems are Greater Than the Sum of their Parts. Fundamental to China’s theory of victory is the PLA’s concept that modem military forces are “‘systems of systems” which are stronger and more efficient than their components would be in isolation because they are linked and networked together through communications and information systems architecture.

• (U//FOUO/RELIDO) Systems Confrontation: The PLA’s theory of modern warfare, therefore, is “systems confrontation,” or competition between these rival “systems of systems,” rather than as a linear contest between discrete units or services of competing armies.

(U) China’s Theory of Victory: System Attack – Win by Fragmenting the Enemy’s Force

(U//FOUO/RELIDO) Create the Conditions for Winning the War: Make 1 +1<2. The PLA plans to defeat an advanced adversary by thoroughly fragmenting the adversary’s system into isolated component parts. The first step of systems attack, therefore, Is to break the essential links and nodes that promote system cohesion in order to sow confusion, degrade communications and disorient adversary leadership. System attack’s ultimate goal ls to paralyze the adversary force, degrading its ability to resist, eroding leadership will to fight and slowing adversary decision-making. China believes that whichever side has a more networked, integrated and cohesive force will have a shorter OODA loop, be able to act more efficiently, and have a better likelihood of victory. Attacks will take place across all domains to degrade the system as a whole rather than focusing on attrition.

• (U//FOUO/REUDO) Fragment the Force: Degrade Data-Flow and C2. The PLA prioritizes degrading or denying an adversary’s use of information early in a crisis and with greater intensity through a conflict. The PLA envisions using kinetic and non-kinetic operations to target an opponent’s data links, communications, military networks, and information systems architecture early in the conflict. Degrading adversary communications amplifies the effects of missile and air strikes against command and control (C2) nodes, including command centers, flagships, and military and civilian leadership.

• (U//FOUO/REUDO) Blind the Enemy. Deny ISR and Early Warning. China will try to degrade adversary decision-making and awareness by targeting its intelligence, surveillance and reconnaissance (ISR) and early warning capabilities, including key space-based collection systems, theater ISR platforms, intelligence centers and satellites.

• (U//FOUO/RELIDO) Own the Initiative: Getting Inside the Adversary OODA Loop. China plans to seize first mover advantage by initiating conflict when the adversary is not prepared. The PLA will try to maintain battlefield initiative by forcing adversaries into a reactive cycle driven by a rapid tempo of unexpected long-range strikes, asymmetric attacks, and harassing attacks.

• (U//FOUO/RELIDO) More Return on Investment Precision Strikes Enable Outsized Effects. The PLA will rely on highly targeted precision strikes against key links and nodes to achieve an outsized effect on the enemy force’s overall stability and effectiveness. Kinetic precision strikes will be complemented by non-kinetic attacks, especially against adversary networks, datalinks, and information systems.

(U/FOUO/RELIDO) Using the Full Against the Fragmentary, Defeating the Slow with the Rapid. System attacks are designed to enable following operations. Once system attacks have fragmented the adversary military so that it cannot operate as a cohesive force, the PLA will commit its broader intact and networked force to combat. Having tilted the battlefield In its own favor, the PLA will carry out supplemental attacks that ensure the adversary•s system does not recover while gradually attriting the adversary’s aircraft, ships, submarines, and other long-range-strike platforms. Sequencing system attacks first enables the PLA to achieve greater effect with lower risk to its force or mission.

• (U//FOUO/RELIDO) China Expects to Have Its System Targeted Too. China expects that the U.S. will try to degrade the PLA’s ability to operate as a coherent force, having developed the systems attack doctrine described above by watching how the United States fights. The PLA therefore is training and equipping the force to operate independently, autonomously, and resiliently, with a notable emphasis on operating in a complex electromagnetic environment.

(U//FOUO/RELIDO) Aspiration Does Not Equal Capability, but It Signals Intent. In PLA doctrine, the rough sequence of operations enabled by systems attacks would be familiar to U.S. military operators: achieve air superiority, then use air superiority to seize maritime superiority and enable ground operations, then use maritime superiority to execute attacks from the sea to the land. The last part of this sequence is aspirational, since China does not currently field ship-launched land attack cruise missiles and its nascent aircraft carrier program is unable to carry out strike warfare. It is, however, how the PLA says it wants to be able to fight, and its acquisitions and training reflect this ambition. China’s doctrine is reflected in its acquisitions and training patterns today. Tomorrow it will be reflected in its operations. The PLA is progressing rapidly. This is how they will fight.

(U) A Note on Sources:

(U//FOUO) The findings of this paper are derived from China’s most authoritative government and military doctrinal writings: The Importance of system of systems confrontation is evident in its inclusion In the 2015 Defense White Paper on Military Strategy. All other details are derived from the 2015 and 2013 editions of the Science of Military Strategy, and .from an unclassified 2018 RAND Corporation study, Systems Confrontation and System Destruction Warfare: How the Chinese People’s Liberation .Army Seeks to Wage Modem Warfare. General assessments on PLA acquisitions, training and operations are reflected in a wide body of unclassified open source materials from 2000 through the present For ease of sourcing, we cited the 2017 Department of Defense Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China.

Analysis of Chinese Investments in the USA

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for yuan

Once hardly noticeable, Chinese investments in U.S. companies are now rising sharply. Cumulative Chinese investments in U.S. companies remain modest compared to those of other major countries. However, a combination of “push and pull” factors are moving China’s annual investment levels closer to levels consistent with China’s current economic stature.

First, the Chinese government has made a conscious decision to diversify its foreign currency assets into hard assets. This has led to the creation of sovereign wealth funds that make portfolio investments in U.S. equities, private firms, and real estate.

Second, the Chinese government has altered its policy guidance toward foreign direct investment (FDI). Whereas it previously encouraged investments almost exclusively toward energy and resource acquisition in developing countries, it now also encourages investments in advanced countries. The government’s goals for these investments include securing energy and mineral resources and acquiring advanced technologies in industries where China wishes to leapfrog existing competitors.

Third, U.S. state governments and, to a lesser extent, the federal government are vigorously trying to attract Chinese greenfield investments in the hope of creating jobs and jump-starting local economies.

Fourth, Chinese investments are being drawn to the United States by the availability of financially weak firms, some of which possess potentially useful technologies for China.

Fifth, some firms that are already competitive with U.S. producers are investing to enhance their U.S. market shares or in response to trade remedies proceedings against unfair trade practices, such as Chinese subsidies.

Economic Benefits

On an aggregate basis, the economic benefits of Chinese investments in the United States have been modest. The precise benefit is difficult to measure due to the convoluted ownership structures of many Chinese investments and the time lags in official U.S. data. Still, based on a combination of official and private data, it is reasonable to conclude that jobs in Chinese-owned companies in the United States increased by 10,000 to 20,000 workers during the past five years.

While hardly significant relative to overall U.S. employment and even to jobs in other countries’ U.S. affiliates, any job creation is welcome given continued slackness in the U.S. labor market.

Chinese FDI in U.S. companies has helped stabilize some financially troubled firms. Portfolio investments by sovereign wealth funds also have helped the economy by solidifying the financial system and providing liquidity to certain property markets.

Chinese investments have occurred in all U.S. regions and in many sectors. According to one private data source, they have been especially prominent since 2007 in the Southwest, Great Lakes, Southeast, and Far West regions, and in the fossil fuels and chemicals, industrial machinery, and information technology industries. According to another private source, as well as government data, the financial sector is also a major recipient of Chinese FDI.

Policy Challenges

These welcome, though still modest, economic benefits are counterbalanced by policy challenges tied to Chinese FDI. First, U.S. affiliates of Chinese companies are not pure market actors and may be driven by state goals, not market forces. China’s outward investments are dominated by state-owned and state-controlled enterprises (SOEs). These entities are potentially disruptive because they frequently respond to policies of the Chinese government, which is the ultimate beneficial owner of U.S affiliates of China’s SOEs. Likewise, the government behaves like an owner, providing overall direction to SOE investments, including encouragement on where to invest, in what industries, and to what ends.

Second, SOEs may have unfair advantages relative to private firms when competing to purchase U.S. assets. SOEs benefit from substantial subsidies in China and their investments in developing countries also receive ample financial support from the national and sub-national governments, state-owned financial institutions and local governments. Government pronouncements out of China suggest that investments in the United States and other advanced countries will also receive ample financial support. This raises the possibility that Chinese largesse could determine market outcomes for purchases of U.S. businesses.

Third, an increased SOE presence may be harmful to the U.S. economy. In China, SOEs are a major force but as a group they are less efficient and profitable than private firms. To the extent that SOEs purchase U.S. companies on the basis of artificial advantages and operate inefficiently, they may not be beneficial to long-term U.S. economic performance.

Fourth, Chinese investments will create tensions related to economic security and national security if they behave in accordance with China’s industrial policy as articulated in the 12th Five Year Plan, government pronouncements, and official investment guidance. China’s current policy guidance directs firms to obtain leapfrog technologies to create national champions in key emerging industries, while investment guidance encourages technology acquisition, energy security, and export facilitation. Based on this juxtaposition, some will conclude that Chinese FDI in the United States is a potential Trojan horse. Indeed, this study describes three investments in new energy products after which production utilizing the desired technology was shifted to China.
Other Findings

U.S. data collection efforts related to FDI are substantial. However, they likely undercount Chinese FDI due to the complicated ownership structures of many Chinese investments. Moreover, although Chinese-owned companies report their data to the U.S. government, many data points are not publically disclosed due to standard U.S. reporting procedures that protect the identities of individual firms. This issue will resolve itself in the coming years if Chinese FDI grows as expected because limits on disclosure will no longer apply.

The United States is relatively open toward FDI, though there are some sectoral restrictions and a national security review undertaken by the Committee on Foreign Investment in the United States (CFIUS). There are a host of laws that subject foreign investors to rules on antitrust, foreign corrupt practices, and trade in arms and sensitive technology products. However, there is no procedure that explicitly considers issues related to economic security, one of the major concerns about Chinese FDI.

Portfolio investments in equities fall under the purview of the Securities and Exchange Commission (SEC). SEC disclosure requirements and practical considerations make it highly unlikely that Chinese SOEs could successfully collude to accumulate significant equity positions in important U.S. firms.

Reverse mergers offer a back door into U.S. capital markets but are not an effective way to acquire important U.S. assets. Indeed, the target of a reverse merger is typically a shell company devoid of meaningful assets. This technique is typically used by private firms that have difficulty accessing capital in China or by provincial SOEs trying to support restructuring efforts in China. There is no indication that any major SOE has used or plans to use this technique to enter the U.S. capital market.

The Chinese legal and regulatory framework for outward FDI requires approvals by three agencies at sub-national and/or national levels. For SOEs, the primary gatekeeper is the State-owned Assets Supervision and Administration Commission (SASAC), though for some investments approval from the State Council is required. The process is widely considered to be cumbersome and is being reformed to facilitate outward FDI.

 

Chinese Cyber Hackers Launch Malicious Bot

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In March 2018, an identified financial services corporation received a thumb drive infected with the bank credential-stealing Qakbot malware variant, targeting information from networked computers and financial institution web sites. The financial services corporation purchased bulk thumb drives from a US online retailer of computer hardware. The thumb drives were originally manufactured in China. According to FBI forensic analysis, the Qakbot malware was on the infected thumb drive before the drive arrived in the United States. Qakbot is extremely persistent and requires removal of all malware from every device. Failure to remove even one node of malware may result in re-infecting previously sanitized systems possibly costing the victim hundreds of thousands of dollars in malware removal and system downtime.

Threat

Qakbot is an information stealing worm—originally discovered in 2007 with a major update in 2017—that propagates through removable drives, network shares, and Web pages. The most common vector of intrusion for Qakbot is malicious attachments to phishing emails. Once executed, Qakbot spreads to other shared folders and uses Server Message Block (SMB) protocol to infect other machines. Qakbot has keylogging capabilities, and is able to propagate across network environments through a single instance within that network. It is capable of remaining on a device through the use of registry keys and by scheduling recurring tasks to run at timed intervals. Every device connected to the network and every piece of removable media which has been attached needs to be scanned for the malware and cleaned of the infection before it can be reconnected. The most recent updates in 2017 allows Qakbot to lock users out of the active directory, preventing them from being able to work. It also deploys malicious executables into network shares, registering them as services.

Cyber actors have the capability to infect devices with malware at nearly any point in the manufacturing process. The FBI has historically seen cases of infection with malware capable of stealing credentials, gathering data on the users of a computer or network, dropping other types of malware, and serving as a “backdoor” into a secure network. It is difficult to know at which point the malware infection occurred or whether the infection was intentional, due to the international nature of hardware manufacturing.

Recommendations

To mitigate the threat of a potentially infected thumb drive, the following measures should be taken at a minimum:

Ensure the use of approved, trusted vendors for hardware purchases.

Scan all hardware, especially removable storage media, on an external system prior to its insertion into a network environment.

For signature-based intrusion detection systems, ensure that the hash value for known Qakbot variants are included. The MD5 value for the variant identified in this PIN was: ff0e3ec80faafd04c9a8b375be77c6b6. This hash value can change, so be prepared to use other advanced detection systems.

Users should protect themselves and organizations by practicing good browsing habits, ensuring they do not respond to or click on unsolicited email, and to not plug unknown USB devices into
their workstations.

If you don’t have the expertise to properly handle or identify potential cyber threats please seek out an expert who can provide the expertise needed to secure your organization.