Connect with us

espionage

Reporter releases names of 4 Canadian politicians allegedly involved in foreign interference

Published

5 minute read

From LifeSiteNews

By Anthony Murdoch

Investigative journalist Sam Cooper released a small list of names of those in government he says whistleblowers told him were involved, in some cases wittingly and in other cases unwittingly, in aiding China’s meddling efforts in Canadian politics.

Four politicians along with one government advisor were named as allegedly being involved in a scheme backed by communist China to purposely interfere in Canada’s electoral process.  

Investigative journalist Sam Cooper claims that confidential whistleblowers have given him the names of politicians and government workers who wittingly and unwittingly helped China interfere in Canadian politics.

The information came to light Monday during a press conference with Independent Canadian MP Kevin Vuong and Cooper, who were also joined by three foreign interference experts. The group held the press conference to bring to light more details regarding accusations that were made by the House of Commons National Security and Intelligence Committee of Parliamentarians (NSICOP) in the spring of this year. 

Thus far, two of those named have denied the allegations, those being Liberal International Trade Minister Mary Ng and Trudeau-appointed Liberal Senator Yuen Pao Woo.

The others named by Cooper include Liberal MP for Steveston—Richmond East, Parm Bains, Guo Ding, who is a journalist as well as an advisor to British Columbia’s recently re-elected Premier David Eby, as well as former Conservative Party senator Victor Oh.  

As of press time, none of these individuals have spoken out about the allegations made by Cooper.  

In the spring of this year, the NSICOP report implied there were at least 11 unidentified officials who wittingly or unwittingly helped foreign entities, notably China as well as India, in their meddling in the Canadian electoral process.  

As for MP Vuong, he has been under investigation for having been targeted by foreign agents and has said that the best solution to “clear the air” is to have all the names in the NSICOP report released. 

“Here’s an easy solution to clear the air: Release The Names,” he wrote on X Tuesday in reply to a post from Ng who said it was “unfortunate that Mr. Vuong recently gave Sam Cooper another platform to make insinuations about me, which I categorically reject.” 

As for Cooper, he has claimed that no less than three national security sources from Canada’s intelligence agency gave him information that Ng was identified as one of the 11 people named in the NSICOP report. He did note that that intelligence did say Ng was unwittingly implicated in the alleged foreign interference scandal. 

The Foreign Interference Commission was convened to “examine and assess the interference by China, Russia, and other foreign states or non-state actors, including any potential impacts, to confirm the integrity of, and any impacts on, the 43rd and 44th general elections (2019 and 2021 elections) at the national and electoral district levels.” 

The commission is headed by Justice Marie-Josée Hogue, who had earlier said she and her lawyers will remain “impartial” and will not be influenced by politics. In January, Hogue said that she would  “uncover the truth whatever it may be.” 

As reported by LifeSiteNews, documents from a federal inquiry looking at meddling in Canada’s past two elections by foreign state actors show that agents of the Communist Chinese Party allegedly worked at Elections Canada polling centers during the 2021 campaign. 

To date, Trudeau has been coy and has never explicitly stated whether he was ever told by the Canadian Security Intelligence Service (CSIS) that CCP agents’ actions were in breach of the nation’s Elections Act. 

A few months ago, the head of Canada’s intelligence agency testified under oath that he gave Trudeau multiple warnings that agents of the CCP were going after Conservative MPs, yet the prime minister has denied receiving these warnings. 

Todayville is a digital media and technology company. We profile unique stories and events in our community. Register and promote your community event for free.

Follow Author

More from this author

Censorship Industrial Complex

Tucker Carlson: Longtime source says porn sites controlled by intelligence agencies for blackmail

Published on

From LifeSiteNews

By Emily Mangiaracina

Journalist Glenn Greenwald replied with a story about how U.S. Speaker of the House of Representatives Mike Johnson changed his tune on a dime about the Foreign Intelligence Surveillance Act (FISA), which allows the government to spy on American communications without a warrant. The journalist made the caveat that he is not assuming blackmail was responsible for Johnson’s behavior.

Tucker Carlson shared during an interview released Wednesday that a “longtime intel official” told him that intelligence agencies control the “big pornography sites” for blackmail purposes.

Carlson added that he thinks dating websites are controlled as well, presumably referring at least to casual “hook-up” sites like Tinder, where conversations are often explicitly sexual.

“Once you realize that, once you realize that the most embarrassing details of your personal life are known by people who want to control you, then you’re controlled,” Carlson said.

He went on to suggest that this type of blackmail may explain some of the strange, inconsistent behavior of well-known figures, “particularly” members of Congress.

“We all imagine that it’s just donors” influencing their behavior, Carlson said. “I think it’s more than donors. I’ve seen politicians turn down donors before.”

Journalist Glenn Greenwald replied with a story about how U.S. Speaker of the House of Representatives Mike Johnson changed his tune on a dime about the Foreign Intelligence Surveillance Act (FISA), which allows the government to spy on American communications without a warrant. The journalist made the caveat that he is not assuming blackmail was responsible for Johnson’s behavior.

Greenwald told how he had seen Johnson grill FBI Director Christopher Wray about his agency’s spying and “could just tell that he felt passionately about (this),” prompting Greenwald to invite Johnson on his show, before anyone had any idea he might become Speaker of the House.

“One of the things we spent the most time on was (the need for) FISA reform,” Greenwald told Carlson, noting that the expiration of the current iteration of the FISA law was soon approaching. He added that Johnson was “determined” to help reform FISA and that it was in fact “his big issue,” the very reason he was on Greenwald’s show to begin with.

Johnson became House Speaker about two months to three months later, and Greenwald was excited about the FISA reform he thought Johnson would surely help bring about.

“Not only did Mike Johnson say, ‘I’m going to allow the FISA renewal to come to the floor with no reforms.’ He himself said, ‘It is urgent that we renew FISA without reforms. This is a crucial tool for our intelligence agencies,’” Greenwald reounted.

He noted that Johnson was already getting access to classified information while in Congress, wondering at Johnson’s explanation for his behavior at the time, which was that he was made aware of highly classified information that illuminated the importance of renewing FISA and the spying capabilities it grants, as is.

Greenwald doesn’t believe one meeting is enough to change the mind of someone who is as invested in a position as Johnson was on FISA reform.

“I can see someone really dumb being affected by that … he’s a very smart guy. I don’t believe he changed his mind. So the question is, why did he?” Greenwald asked.

“I don’t know. I really don’t. But I know that the person that was on my show two months ago no longer exists.”

Theoretically, there are many ways an intelligence agency could coerce a politician or other person of influence into certain behaviors, including personal threats, threats to family, and committing outright acts of aggression against a person.

A former CIA agent has testified during an interview with Candace Owens that his former employer used the latter tactic against him and his family, indirectly through chemicals that made them sick, when he blew the whistle on certain unethical actions the CIA had committed.

“This is why you never hear about CIA whistleblowers. They have a perfected system of career destruction if you talk about anything you see that is criminal or illegal,” former CIA officer Kevin Shipp said.

As a form of coercion, sexual blackmail in particular is nothing new, although porn sites make the possibility much easier. In her book “One Nation Under Blackmail: The Sordid Union Between Intelligence and Crime That Gave Rise to Jeffrey Epstein,” investigative journalist Whitney Webb discusses not only how the intelligence community uses sexual blackmail through people like Jeffrey Epstein but how it was used by organized crime before U.S. intelligence even existed.

Continue Reading

Daily Caller

Chinese Agents Can Now Access Every American’s Phone Calls And Texts, GOP Senator Warns

Published on

Republican South Dakota Sen. Mike Rounds warned Friday that China’s state-sponsored hackers, known as Salt Typhoon, have gained the capability to spy on millions of Americans through their mobile phones. (Screenshot/YouTube/HalifaxtheForum)

From the Daily Caller News Foundation 

By Mariane Angela

Republican South Dakota Sen. Mike Rounds warned Friday that China’s state-sponsored hackers, known as Salt Typhoon, have gained the capability to spy on millions of Americans through their mobile phones.

During an event at Halifax The Forum, Rounds revealed that hackers have infiltrated all major U.S. telecommunications firms. Rounds said these hackers have penetrated every major telecom provider in the country. He also said the Chinese Communist government is capable of reading texts and listening to conversations.

“Any one of us and every one of us today is subject to the review by the Chinese Communist government of any cell phone conversation you have with anyone in America. Because they have access to every single one of our major telecommunications companies. They have broken in. They can read your texts, and they can hear your conversations,” Rounds said. “It’s just a matter of who they want to listen to and who they don’t.”

Salt Typhoon, identified as a Chinese hacking group, has infiltrated the networks of AT&T, Verizon, and T-Mobile, and their presence lingers, according to Democratic Virginia Sen. Mark Warner, chair of the Senate Intelligence Committee, The Washington Post reported. Warner called the breach “the worst telecom hack in our nation’s history—by far.”

The breach, ongoing for over a year, affects telecom giants such as AT&T, Verizon, and T-Mobile. Hackers even accessed law enforcement wiretap request logs, revealing investigative targets, though the wiretap system itself remains uncompromised, WaPo said. The breach reportedly targeted communications involving former President Donald Trump, Vice President-elect JD Vance, and White House officials.

Despite intervention from the FBI, the hackers remain embedded in the U.S. telecom infrastructure, according to WaPo. Warner explained that expelling them will require a massive overhaul, including the physical replacement of thousands of routers and switches across affected networks.

“This is an ongoing effort by China to infiltrate telecom systems around the world, to exfiltrate huge amounts of data,” Warner said.

The group exploited outdated infrastructure and inter-network trust, enabling real-time eavesdropping and data exfiltration, the outlet reported. While fewer than 150 individuals were directly targeted, the scope of compromised data extends to millions of associated contacts.

The Biden administration urges stricter cybersecurity measures to counter persistent Chinese aggression.

“We must lock our digital doors,” Deputy National Security Adviser Anne Neuberger said.

National security officials, including Trump appointees, vow heightened focus on combating cyber threats.

Continue Reading

Trending

X