Business
DOJ charges 7 Chinese spies with targeting US political leaders, major businesses
From LifeSiteNews
By Matt Lamb
The hackers ‘spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials’ as part of a massive Chinese espionage operation, according to the DOJ.
Hackers targeted defense contractors, American political leaders, and U.S. companies with malware as part of a surveillance operation for the Chinese Communist Party, the Department of Justice (DOJ) alleges.
The DOJ released details on the indictment of seven Chinese individuals who have been charged with “conspiracy to commit computer intrusions and conspiracy to commit wire fraud,” according to a Monday news release.
The individuals are part of a People’s Republic of China (PRC) group who “spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives,” according to the DOJ.
Officials unsealed the indictment on Monday, though charges were originally filed in January.
The indictment provides further insight into how the CCP targets American companies and political leaders for retribution and influence using computer viruses.
The CCP and its Ministry of State Security “sought to obtain information on political, economic and security policies that might affect the PRC, along with military, scientific and technical information of value to the PRC,” the indictment states. “Among other things, the MSS and its state security departments focused on surreptitiously identifying and influencing the foreign policy of other countries, including the United States.”
The hackers used a front company called Wuhan XRZ beginning in at least 2010. They would send fake emails to U.S. senators, business leaders, and information technology companies looking to gain access. They were successful in hacking defense contractors, information technology providers, and universities, among other victims.
The DOJ itself was targeted, along the Commerce Department, the Treasury Department, and the White House.
The Justice Department alleges:
These computer network intrusion activities resulted in the confirmed and potential compromise of work and personal email accounts, cloud storage accounts and telephone call records belonging to millions of Americans, including at least some information that could be released in support of malign influence targeting democratic processes and institutions, and economic plans, intellectual property, and trade secrets belonging to American businesses, and contributed to the estimated billions of dollars lost every year as a result of the PRC’s state-sponsored apparatus to transfer U.S. technology to the PRC.
The “Conspirators,” as they are called in the filing, began sending out phishing emails in at least 2015, according to the DOJ. The emails would look like they were from “prominent American journalists” with excerpts from news sites.
“If the recipient activated the tracking link by opening the email, information about the recipient, including the recipient’s location, IP addresses, network schematics and specific devices used to access the pertinent email accounts, was transmitted to a server controlled by the Conspirators,” the DOJ stated. “The Conspirators used this method to enable more direct and sophisticated targeting of recipients’ home routers and other electronic devices, including those of high ranking U.S. government officials and politicians and election campaign staff from both major U.S. political parties.”
In just a few months in 2018, the hackers “sent more than 10,000 malicious email messages” to “high-ranking U.S. government officials and their advisors, including officials involved in international policy and foreign trade issues.”
They also targeted campaign staff for “a presidential campaign” in 2020. The filing does not state which campaign.
European Union and United Kingdom leaders who were part of the anti-Communist Inter Parliamentary Alliance on China were also targeted.
Other victims included: “a nuclear power engineering company,” a defense contractor, an aerospace contractor, and “a leading American manufacturer of software and computer services based in California.”
Telecommunications companies, law firms, and steel companies were also targeted.
The CCP impersonated real steel companies in order to gain access to their emails during a battle over tariffs on China. After the Trump administration announced new steel tariffs in 2018, the hackers “registered a malicious domain impersonating the legitimate domain of one of the largest steel producers in the United States (the ‘American Steel Company’)” as well as the International Steel Trade Forum.
“These malicious domains allowed the Conspirators to communicate with malware they installed on the network of the American Steel Company to access and surveil the victim,” the DOJ stated.
They also targeted the Norwegian government in 2018 because it was considering awarding the Nobel Prize to Hong Kong democracy activists.
The PRC is a “malicious nation state,” a federal prosecutor stated in the DOJ news release.
“These allegations pull back the curtain on China’s vast illegal hacking operation that targeted sensitive data from U.S. elected and government officials, journalists, and academics; valuable information from American companies; and political dissidents in America and abroad. Their sinister scheme victimized thousands of people and entities across the world, and lasted for well over a decade,” U.S. Attorney Breon Peace for the Eastern District of New York stated in the news release.
“America’s sovereignty extends to its cyberspace. Today’s charges demonstrate my office’s commitment to upholding and protecting that jurisdiction, and to putting an end to malicious nation state cyber activity.”
Business
Google Dumps EU’s Anti-“Disinformation” Code, Defying Digital Services Act
Does Google’s bold rejection of EU mandates signal a shifting balance of power between tech giants and censors?
It’s as good a time as any to effectively pull out of the EU’s “voluntary anti-disinformation” deal, which social media companies were previously strong-armed into accepting. And Google has now done just that.
The “strengthened” Code of Practice on Disinformation was introduced during the heyday of online censorship and government pressure on social platforms on both sides of the Atlantic – in June 2022, and at one point included 44 signatories.
One of those who in the meanwhile dropped out is X, and this happened shortly after Twitter was acquired by Elon Musk.
Now, as the “voluntary” code is formally becoming part of EU’s censorship law, the Digital Services Act (DSA), Google took the opportunity to notify Brussels it will not comply with the law’s requirement to include fact-checkers’ opinions in the search results, or rely on those to delete or algorithmically rank YouTube content.
Accepting these DSA requirements “simply isn’t appropriate or effective for our services,” Google’s Global Affairs President Kent Walker stated in a letter sent to European Commission’s Deputy Director-General for Communications Networks, Content and Technology, Renate Nikolay, reports said.
At the same time, Google is withdrawing from “all fact-checking commitments in the Code” – this refers to the signatories working with “fact-checkers” across EU member-countries. The code also requires tech companies to flag content, label political ads, demonetizing users found to be “spreading disinformation,” etc.
Even though Google’s censorship apparatus does not use third-party “fact-checkers” as it is, the news that the company has decided to defy the EU on this issue is interpreted as yet more proof that social media giants are breaking free from some of the constraints imposed on them by the authorities over the past years.
Meta recently announced that its fact-checking scheme in the US was ending in order to make room for more free speech on Facebook and Instagram, but it remains a signatory of the Code in the EU.
It remains to be seen what decision Meta will make once that agreement becomes part of the DSA – the deadline for which is currently unknown.
If you’re tired of censorship and surveillance, subscribe to Reclaim The Net.
Banks
Four of Canada’s top banks ditch UN-backed ‘net zero’ climate alliance
From LifeSiteNews
Among the banks that have withdrawn from the UN-backed Net-Zero Banking Alliance are TD Bank, the Bank of Montreal and CIBC.
In a stunning reversal, four of Canada’s top banks have withdrawn themselves from a United Nations “net zero” alliance that supports the eventual elimination of the nation’s oil and gas industry in the name of “climate change.”
Last Friday, Toronto-Dominion Bank (TD), Bank of Montreal (BMO), National Bank of Canada and the Canadian Imperial Bank of Commerce (CIBC) said they were all withdrawing from the Net-Zero Banking Alliance (NZBA), which calls for banks to come in line with the push for “Net Zero” emissions by 2050. The NZBA is a subgroup of the Glasgow Financial Alliance for Net Zero (GFANZ), which was founded and backed by the United Nations.
Interestingly, the GFANZ was formed in 2021, while Liberal Party leadership candidate Mark Carney was its co-chair. He resigned from his role in the alliance right before he announced he would run for Liberal leadership to replace Prime Minister Justin Trudeau last week.
The sudden decision from Canadian banks to ditch the alliance comes despite Trudeau’s government still being committed to so-called “net zero” policies and only a few days before pro-oil and gas U.S. President Donald Trump was sworn into office.
According to a statement from BMO, it is no longer a “member of the Net-Zero Banking Alliance (NZBA),” but it is still “committed” to the idea of an eventual “net zero” world.
“We are fully committed to our climate strategy and supporting our clients as their lead partner in the transition to a net-zero world. We have robust internal capabilities to implement relevant international standards, supporting our climate strategy and meeting our regulatory requirements,” it said.
In a statement regarding its exit from the NZBA, TD Bank said that it has the “resources, relationships and capabilities to continue to advance our strategy, deliver for our shareholders and advise our clients as they adapt their businesses and seize new opportunities.”
Large U.S. banks such as Morgan Stanley, JPMorgan Chase & Co, Wells Fargo and Bank of America have all withdrawn from the group as well.
Since taking office in 2015, the Trudeau government has continued to push a radical environmental agenda like the agendas being pushed by the World Economic Forum’s “Great Reset” and the United Nations’ “Sustainable Development Goals.” Part of this push includes the promotion of so called “Net Zero” energy by as early as 2035 nationwide.
-
Alberta2 days ago
Is There Any Canadian Province More Proud of their Premier Today…
-
Dan McTeague21 hours ago
Carney launches his crusade against the oilpatch
-
National1 day ago
Poilievre calls likely Trudeau replacement Mark Carney the World Economic Forum’s ‘golden boy’
-
National1 day ago
Chrystia Freeland’s WEF page deleted after she announces bid to replace Trudeau
-
Censorship Industrial Complex1 day ago
WEF ranks ‘disinformation’ as greater threat to world stability than ‘armed conflict’
-
Business1 day ago
Opposition leader Poilievre calling for end of prorogation to deal with Trump’s tariffs
-
Economy2 days ago
Trump declares national energy emergency
-
Daily Caller1 day ago
Pastor Lectures Trump and Vance On Trans People, Illegal Immigrants