ReportWire

Tag: us intelligence agencies

  • Notable US Spies Fast Facts | CNN

    Notable US Spies Fast Facts | CNN

    [ad_1]



    CNN
     — 

    Here is a look at some US citizens who have been convicted of spying against the United States.

    1962 – Aldrich Ames, son of a CIA analyst, joins the agency as a low-level documents analyst.

    1967-1968 – Enters the Career Trainee Program at the CIA and becomes an operations officer.

    1970s – Specializes in Soviet/Russian intelligence services.

    April 16, 1985 – Volunteers to spy against the United States to KGB agents at the Soviet Embassy in Washington, DC. He receives a payment of $50,000.

    1986-1989 – Ames is stationed in Rome and continues to pass information to Soviet agents. He is paid approximately $1.8 million during this period.

    Late 1980s – The CIA and FBI learn that a number of Russian double agents have been arrested and some executed.

    May 1993 – The FBI begins investigating Ames, with both physical and electronic surveillance.

    February 21, 1994 – Ames and his wife, Rosario, are arrested in Arlington, Virginia, by the FBI, accused of spying for the Soviet Union and later, Russia. It is estimated that Ames has received approximately $2.5 million from Russia and the Soviet Union for his years of spying.

    April 28, 1994 – Ames pleads guilty and is sentenced to life in prison without the possibility of parole. In October 1994, Ames’ wife receives 63 months in prison.

    October 31, 1995 – CIA Director John Deutch testifies before Congress about the scope of Ames’ espionage. He states that more than 100 US spies were compromised and that tainted intelligence was given to Presidents George H.W. Bush and Bill Clinton.

    1970-1991 – David Boone serves in the US Army as a signals intelligence analyst. During the late 1980s, he is assigned to the National Security Agency as a senior cryptologic traffic analyst.

    October 1988 – In the midst of a divorce and financial problems, Boone goes to the Soviet embassy in Washington, DC, and offers to spy on the United States. He is paid about $20,000 a year for his work over the next three years. He continues spying after being transferred to a post in Germany.

    1991 – Boone loses his security clearance and retires from the Army, remaining in Germany.

    1998 – He is contacted by a retired FBI agent posing as a Russian agent. The agent meets with Boone in London and the United States and pays him $9,000 to return to spying for Russia.

    October 14, 1998 – Boone is charged with passing defense documents to the Soviet Union. He pleads guilty in December 1998.

    February 26, 1999 – He is sentenced to 24 years in prison.

    January 14, 2020 – Boone is released from prison.

    1996 – Peter Rafael Dzibinski Debbins makes visits to Russia to meet with their intelligence agents. He is given a code name and signs a settlement “attesting that he wanted to serve” them.

    1998-2005 – Debbins joins the Army, where he serves in chemical units before being selected for the US Army Special Forces.

    August 21, 2020 – The Department of Justice announces that Debbins has been charged with providing information about US national defenses to Russian agents.

    May 14, 2021 – The DOJ announces that Debbins is sentenced to 188 months in federal prison for conspiring with Russian agents to provide them with US defense intelligence.

    1968-1986 – Noshir Gowadia is employed by Northrop Grumman where he works on technology relating to the B-2 Spirit Bomber, aka the “Stealth” bomber.

    July 2003-June 2005 – Travels to China six times to “provide defense services in the form of design, test support and test data analysis of technologies to assist the PRC with a cruise missile system by developing a stealthy exhaust nozzle.” He is paid over $100,000 during this period.

    October 2005 – Arrested and charged with passing national defense information to China. Superseding indictments are issued in 2006 and 2007.

    August 9, 2010 – Gowadia is found guilty.

    January 24, 2011 – He is sentenced to 32 years in prison.

    January 12, 1976 – Robert Hanssen joins the FBI.

    1979 – Begins spying for the Soviet Union.

    1980 – Begins working for the counterintelligence unit, focusing on the Soviet Union.

    1981 – Transfers to FBI headquarters, initially tracking white-collar crime and monitoring foreign officials assigned to the United States. He is later assigned to the Soviet Analytical Unit.

    1981 – Hanssen’s wife catches him with classified documents and convinces him to stop spying.

    October 4, 1985 – Resumes spying.

    1991 – Breaks off relations with the KGB.

    1999 – Resumes spying, this time for the Russian Foreign Intelligence Service.

    2000 – The FBI identifies Hanssen from a fingerprint and from a tape recording supplied by a disgruntled Russian intelligence operative. The FBI also obtains the complete original KGB dossier on Hanssen.

    December 2000 – The FBI begins surveillance of Hanssen.

    February 18, 2001 – Hanssen is arrested in a Virginia park after making a drop of classified documents. Agents find a bag nearby containing $50,000 that they believe is Hanssen’s payment for the documents.

    July 6, 2001 – Pleads guilty to 15 counts of espionage and conspiracy in exchange for the government not seeking the death penalty.

    May 10, 2002 – He is sentenced to life in prison without the possibility of parole.

    June 5, 2023 – Hanssen dies in prison.

    1984 – Ana Montes is recruited to spy for Cuba. She is never paid for her spying.

    1985-2001 – She is employed by the Defense Intelligence Agency as an analyst. She is promoted several times, eventually becoming the DIA’s top Cuba analyst.

    Fall 2000 – The FBI and DIA begin investigating Montes.

    September 11, 2001 – In response to attacks on the United States, Montes is named acting division chief, which gives her access to the plans to attack Afghanistan and the Taliban.

    September 21, 2001 – Montes is arrested in Washington, DC, and is charged with conspiracy to deliver defense information to Cuba.

    March 20, 2002 – Pleads guilty to espionage and is sentenced to 25 years in prison.

    January 6, 2023 – Montes is released from prison.

    1977 – Walter Kendall Myers begins working for the US State Department on contract, as an instructor.

    1978 – Myers travels to Cuba and is recruited by Cuban intelligence.

    1979 – Myers and his girlfriend [later his wife], Gwendolyn, begin spying for Cuba. It is believed they receive little to no payment for their services.

    1985 – He is hired by the State Dept. as a senior analyst.

    October 31, 2007 – Myers retires from the State Dept.

    June 4, 2009 – The Myers are arrested.

    November 20, 2009 – He pleads guilty to wire fraud and conspiracy to commit espionage. Gwendolyn Myers pleads guilty to conspiracy to gather and transmit national defense information.

    July 16, 2010 – Myers is sentenced to life in prison. His wife is sentenced to 81 months.

    1980 – Harold Nicholson joins the CIA after serving in the United States Army.

    1982-1989 – Nicholson works for the CIA in the Philippines, Thailand and Japan.

    1992-1994 – Deputy Chief of Station/Operations Officer in Kuala Lumpur, Malaysia.

    June 1994-November 1996 – Provides Russian Intelligence with sensitive information.

    November 16, 1996 – Arrested at Dulles International Airport carrying classified CIA information.

    November 27, 1996 – Nicholson pleads not guilty.

    June 5, 1997 – He is convicted of espionage and sentenced to 23 years in prison.

    2008 – Nicholson’s son, Nathaniel, is arrested on charges he met with Russian agents to collect money owed to his father.

    January 18, 2011 – Harold Nicholson is sentenced to an additional eight years in prison on charges of conspiracy to act as an agent of a foreign government and conspiracy to commit money laundering. Nathaniel Nicholson is sentenced to five years probation.

    1965-1979 – Ronald Pelton works for the National Security Agency, with top-level security clearance.

    1979 – Pelton leaves the NSA due to financial problems.

    January 1980 – After declaring bankruptcy in 1979, Pelton begins spying for the Soviet Union. He discloses classified information on the United States’ ability to intercept Soviet communications.

    November 25, 1985 – After a KGB defector reveals his name, Pelton is arrested and charged with espionage.

    June 5, 1986 – He is convicted of spying.

    December 17, 1986 – Pelton is sentenced to three concurrent life sentences plus 10 years.

    November 24, 2015 – Pelton is released from prison.

    1983-1996 – Earl Edwin Pitts works at the FBI.

    1987-1992 – Pitts passes information on FBI operations to the Soviet Union and Russia.

    1995 – A Russian diplomat at the UN names Pitts as a former spy. FBI agents posing as Russian intelligence officers contact Pitts to attempt to lure him back to spying. Pitts delivers documents in exchange for $65,000.

    December 18, 1996 – Pitts is arrested. He is charged two days later with conspiring and attempting to commit espionage.

    February 28, 1997 – Pleads guilty. At the time, he is only the second agent in the FBI’s history to be found guilty of espionage.

    June 23, 1997 – He is sentenced to 27 years in prison.

    December 20, 2019 – Pitts is released from prison.

    1979 – Pollard is hired to work at the Navy Field Operational Intelligence Office. He had been rejected previously from employment at the CIA due to drug use. His specialty is North America and the Caribbean.

    June 1984 – He begins spying for Israel, passing on information on Arab countries. He earns $1,500-$2,500 a month.

    November 21, 1985 – Pollard is arrested outside the Israeli Embassy after his request for asylum is denied.

    June 4, 1986 – Pleads guilty to conspiracy to commit espionage.

    March 4, 1987 – US District Judge Aubrey Robinson Jr. rejects a plea agreement reached by federal prosecutors and Pollard. Instead, he sentences Pollard to life in prison. Pollard is the only person in US history to receive a life sentence for spying on behalf of a US ally. Presidents Bill Clinton, George W. Bush and Barack Obama have rejected pleas for clemency.

    1995 – Israel grants Pollard citizenship.

    May 11, 1998 – Israel admits for the first time that Pollard was working as its agent.

    2002 – Former Israeli Prime Minister Benjamin Netanyahu visits Pollard in prison.

    July 28, 2015 – Pollard’s attorney announces that Pollard has been granted parole and will be released in November.

    November 20, 2015 – Pollard is released on parole.

    November 20, 2020 – Pollard completes his parole. A month later Pollard and his wife arrive in Israel to start a new life.

    1969-1994 – George Trofimoff, a naturalized American citizen of Russian parentage, works as a civilian for the US Army at the Joint Interrogation Center in Nuremberg, Germany. He also attains the rank of colonel in the Army reserve.

    1994 – Trofimoff and a priest in the Russian Orthodox church, Igor Susemihl, are arrested in Germany on spying charges. The charges are later dropped.

    1994 – Retires and moves to South Florida.

    June 14, 2000 – Trofimoff is arrested. US Attorney Donna Bucella describes him as “the highest-ranking US military officer ever charged with espionage. He is accused of passing classified information on Soviet and Warsaw Pact military capabilities from 1969-1994. Allegedly, he received payment of over $250,000 during that time.

    June 27, 2001 – He is convicted of spying for the Soviet Union and Russia. He is later sentenced to life in prison.

    September 19, 2014 – Trofimoff dies in prison.

    [ad_2]

    Source link

  • Death of Osama bin Laden Fast Facts | CNN

    Death of Osama bin Laden Fast Facts | CNN

    [ad_1]



    CNN
     — 

    Here’s a look at the death of Osama bin Laden.

    On May 2, 2011, Al Qaeda leader Osama bin Laden was killed by US Special Forces during an early morning raid at a compound in Abbottabad, Pakistan.

    – Built in approximately 2006.
    – Significantly larger than other homes in the area, and worth a reported $1 million.
    – Lacked telephone and internet service.
    – Residents burned their trash rather than having it picked up.
    – Approximately 24 people lived at the house.
    – Surrounded by 12- to 18-foot walls topped by barbed wire.
    – Had two security gates.
    – Bin Laden and his family’s living quarters were on the second and third levels.
    – The third floor terrace had a seven-foot privacy wall.
    – Located only about a mile from the Pakistan Military Academy.

    US forces retrieved numerous items from bin Laden’s compound, including 10 hard drives, five computers and more than 100 storage devices, such as disks, DVDs and thumb drives, according to a senior US official.

    2007 (approx.) – US intelligence uncovers the name of one of bin Laden’s most trusted couriers.

    2009 (approx.) – Intelligence sources identify the area of Pakistan where the courier and his brother live.

    August 2010 – US intelligence sources identify the Abbottabad compound as the home of the courier and his brother, who have no obvious means of affording a $1 million home.

    September 2010 – The CIA informs President Barack Obama that bin Laden may be living in the Abbottabad compound. They base this on the size and price tag of the compound as well as the elaborate security.

    February 2011 – The intelligence on the Abbottabad compound is considered strong enough to begin planning action.

    March 14, 2011 – President Obama chairs the first of five National Security Council meetings to discuss an operation to raid bin Laden’s compound.

    March 29, 2011 – Second National Security meeting.

    April 12, 2011 – Third meeting.

    April 19, 2011 – Fourth meeting.

    April 28, 2011 – Last of the National Security Council meetings on the bin Laden raid.

    April 29, 2011 – At 8:20 a.m. ET, President Obama gives the order to raid bin Laden’s compound.

    May 2, 2011 – In the early morning hours (mid-afternoon on May 1 in the United States), a group of 25 Navy Seals raid the compound in Abbottabad, Pakistan.
    – They arrive outside the compound in two Black Hawk helicopters.
    – The operation takes 40 minutes total.
    – US Special Forces breach the outer walls of the compound before fighting their way through the ground floor of the three-story building. The firefight then moves to the second and third floors.
    – In the last 5-10 minutes of the firefight, bin Laden is killed by a gunshot wound to the head.
    – Three men, including a son of bin Laden, are killed as well as one woman.
    – Bin Laden’s body is identified by one of his wives. Facial recognition is also used.

    May 2, 2011 – Bin Laden is buried at sea off the deck of the USS Carl Vinson in the Arabian Sea.
    – He is buried within 24 hours according to Islamic law.
    – The hour-long ceremony aboard the USS Carl Vinson is conducted according to Islamic law.

    May 2, 2011 – A DNA test is done on a sample from the body, confirming that it is bin Laden.

    May 3, 2011 – Attorney General Eric Holder declares the raid “lawful, legitimate and appropriate in every way.”

    May 3, 2011 – White House Press Secretary Jay Carney offers new details on the raid. He clarifies that the woman killed was on the first floor, not with bin Laden, and was killed in the crossfire. Carney also says that bin Laden was not armed but did put up resistance.

    May 3, 2011 – A congressional source tells CNN that bin Laden had approximately $745 and two telephone numbers sewn into his clothing.

    May 3, 2011 – Taliban spokesman Zabiullah Mojahed releases a statement, “Obama has not got any strong evidence that can prove his claim over killing of the Sheikh Osama bin Laden… And secondly, the closest sources for Sheikh Osama bin Laden have not confirmed” the death.

    May 4, 2011 – White House Press Secretary Carney announces that President Obama has decided not to release photos of bin Laden’s body.

    May 6, 2011 – Al Qaeda confirms bin Laden’s death, in a statement on jihadist forums.

    May 12, 2011 – US officials confirm to CNN that US authorities have interviewed three of bin Laden’s wives.

    May 13, 2011 – It is revealed that a large amount of pornography was seized from the Abbottabad compound during the raid. It is unclear to whom it belonged.

    May 13, 2011 – A US military official tells CNN the Navy Seal team who carried out the bin Laden raid wore helmet-mounted digital cameras that recorded the mission.

    May 17, 2011 – Senator John Kerry announces that Pakistan will return the tail of the US helicopter damaged during the raid.

    May 18, 2011 – Admiral Mike Mullen and Defense Secretary Robert Gates tell reporters there is no evidence that the senior Pakistani leadership knew of bin Laden’s presence in Pakistan.

    May 26, 2011 – A team of CIA forensic specialists is granted permission by the Pakistani government to examine the compound.

    June 15, 2011 – Pakistan’s intelligence agency arrests several people suspected of assisting the CIA before the raid.

    June 17, 2011 – The US Justice Department formally drops terrorism-related criminal charges against bin Laden.

    July 11, 2011 – Pakistani security forces detain a doctor suspected of helping the CIA attempt to collect the DNA of bin Laden’s family members through a vaccination drive.

    October 6, 2011 – Pakistan’s information ministry says the doctor suspected of helping the CIA target bin Laden will be charged with treason. Also, bin Laden’s compound will be turned over to city officials.

    February 2012 – Pakistani authorities begin to demolish the compound.

    May 9, 2012 – Citing that it is of national security interest, a federal judge has denies Judicial Watch’s Freedom of Information request regarding the release of bin Laden death photos.

    May 23, 2012 – Shakeel Afridi, the Pakistani doctor accused of helping the CIA track down bin Laden, is fined $3,500 for spying for the United States and sentenced to 33 years in prison for treason by a tribal court.

    September 4, 2012 – The memoir “No Easy Day: The Firsthand Account of the Mission that Killed Osama bin Laden” by former US Navy SEAL Matt Bissonnette, written under the name Mark Owen, is published.

    February 11, 2013 – Conflicting information about which Navy SEAL killed bin Laden appears when Esquire magazine reports on an unnamed former Navy SEAL who says he fired the kill shot, not the point man as told in Bissonette’s book “No Easy Day.”

    May 21, 2013 – A three-judge federal appeals court panel rejects an appeal from a conservative legal group, ruling that the release of post-mortem images of bin Laden’s body could result in attacks on Americans.

    October 31, 2014 – Adm. Brian Losey, head of the Naval Warfare Special Command, releases an open letter warning Navy SEALs against betraying their promise of secrecy. This is in advance of two upcoming interviews from SEALs involved in the bin Laden mission.

    November 7, 2014 – Former Navy SEAL Robert O’Neill says in an interview with The Washington Post that he was the one who fired the shot that killed bin Laden.

    May 10, 2015 – In a published report, investigative journalist Seymour Hersh contends the Obama Adminstration lied about the circumstances surrounding the killing of bin Laden. The White House later dismisses the report as “baseless.”

    May 20, 2015 – The Office of the Director of National Intelligence begins releasing and declassifying documents recovered in the raid in May 2011.

    March 1, 2016 – A second batch of recovered documents is released by the DNI. Included in the materials are bin Laden’s personal letters and will.

    August 2016 – Bissonnette agrees to pay the US government all past and future proceeds of the book “No Easy Day,” settling a lawsuit by the government for “breach of contract” by violating a non-disclosure agreement.

    November 1, 2017 – The CIA announces the release of thousands of files it says came from the bin Laden raid. Among them is the deceased al Qaeda founder’s personal journal.

    April 2023 – Newly released photos, obtained from the Obama Presidential Library via a Freedom of Information Act request by The Washington Post, offer a window into the meticulous planning – and tension – among the highest-ranking members of the US government on May 1, 2011.

    [ad_2]

    Source link

  • Michael Hayden Fast Facts | CNN

    Michael Hayden Fast Facts | CNN

    [ad_1]



    CNN
     — 

    Here’s a look at the life of Michael Hayden, former director of the Central Intelligence Agency.

    Birth date: March 17, 1945

    Birth place: Pittsburgh, Pennsylvania

    Birth name: Michael Vincent Hayden

    Father: Harry Hayden

    Mother: Sadie Hayden

    Marriage: Jeanine (Carrier) Hayden

    Children: Margaret, Michael and Liam

    Education: Duquesne University, B.A, 1967; Duquesne University, M.A., 1969

    Military service: US Air Force, 1967-2008, General

    Is a retired four-star general.

    Is a distinguished visiting professor and founder of the Michael V. Hayden Center for Intelligence, Policy, and International Security at George Mason University.

    Worked as a cab driver during college.

    January 1970-January 1972 – Analyst at Headquarters Strategic Air Command at Offutt Air Force Base, Nebraska.

    January 1972-May 1975 – Chief of Current Intelligence Division at Andersen Air Force Base, Guam.

    July 1975-August 1979 – Academic Instructor at Reserve Officer Training Corps Program, St. Michael’s College in Vermont.

    June 1980-July 1982 – Chief of Intelligence, 51st Tactical Fighter Wing, Osan Air Force Base, South Korea.

    1984-1986 – Air attaché, US Embassy, Bulgaria.

    1986-1989 – Political-Military Affairs Officer, US Air Force Headquarters.

    1989-1991 – Director for Defense Policy and Arms Control, National Security Council.

    1991-1993 – Chief, Secretary of the Air Force Staff Group.

    1993-1995 – Director of Intelligence, US European Command.

    1996-1997 – Commander, Air Intelligence Agency, and Director, Joint Command and Control Warfare Center.

    1997-1999 – Deputy Chief of Staff, United Nations Command and US Forces Korea.

    1999-2005 – Director of the National Security Agency.

    April 2005 – Is appointed principal deputy director of national intelligence.

    May 8, 2006 – President George W. Bush nominates Hayden to be director of the CIA.

    May 30, 2006 – Is sworn in as the director of the CIA.

    February 5, 2008 – During congressional testimony, Hayden acknowledges for the first time that the CIA has used waterboarding in the interrogations of detainees.

    July 1, 2008 – Retires from the Air Force.

    February 12, 2009 – Steps down as the director of the CIA.

    February 13, 2009 – Leon Panetta is sworn in as the new director of the CIA.

    April 2009 – Joins the Chertoff Group, a security consulting firm founded by Michael Chertoff, former Department of Homeland Security secretary.

    September 11, 2014 – In an interview with U.S. News and World Report, Hayden compares the White House strategy of using air strikes against ISIS to casual sex. Hayden says, “The reliance on air power has all of the attraction of casual sex: It seems to offer gratification but with very little commitment.”

    December 9, 2014 – The Senate releases a report criticizing the CIA’s interrogation tactics used against terrorist detainees during the Bush era. Hayden responds in an interview with Politico, calling the Senate’s conclusions “analytically offensive.”

    February 23, 2016 – Hayden’s book “Playing to the Edge: American Intelligence in the Age of Terror” is published.

    August 9, 2016 – After signing a letter, along with 49 other Republican national security officials, declaring Donald Trump unqualified to be president, Hayden tells CNN that Trump represents a “clear and present danger” and says he “fears for our future” if Trump governs as he has campaigned.

    May 1, 2018 – Hayden’s book “The Assault on Intelligence: American National Security in an Age of Lies” is published.

    November 23, 2018 – According to a statement released by his family, Hayden suffers a stroke at home earlier in the week.

    January 18, 2019 – Hayden returns home after suffering a stroke.

    October 7, 2020 – Hayden tells CNN’s Jim Sciutto that reelecting Trump would be “very bad for America,” while endorsing Democratic nominee Joe Biden for president.

    [ad_2]

    Source link

  • Robert Levinson Fast Facts | CNN

    Robert Levinson Fast Facts | CNN

    [ad_1]



    CNN
     — 

    Here’s a look at the life of Robert Levinson, who went missing in Iran in 2007.

    Birth date: March 10, 1948

    Birth place: Flushing, New York

    Birth name: Robert Alan Levinson

    Father: Name unavailable publicly

    Mother: Name unavailable publicly

    Marriage: Christine (Gorman) Levinson

    Children: Douglas, Samantha, David, Daniel, Sarah, Stephanie and Susan

    Education: City College of New York, B.A., 1970

    During his career at the FBI, Levinson specialized in investigating organized crime in Russia.

    His family said Levinson suffered from diabetes and high blood pressure.

    1970s – Levinson is hired by the FBI after six years with the Drug Enforcement Agency.

    1998 – Levinson retires from the FBI.

    1998-2007 – Levinson works as a private investigator.

    2006 – Levinson is hired as a contractor by Tim Sampson, head of the Illicit Finance Group within the Office of Transnational Issues at the CIA, to write reports for the agency. The contract is for approximately $85,000. Three CIA employees, including Sampson, later lose their jobs for overstepping their authority as analysts and withholding information about Levinson after he disappeared.

    March 8-9, 2007 – According to State Department officials, Levinson travels to Kish Island in Iran and checks into a hotel. Reportedly, Levinson is in the Middle East to investigate cigarette smuggling on behalf of a client. During the visit, he meets with American fugitive Dawud Salahuddin, who is the last person to acknowledge seeing him on March 9.

    June 1, 2007 – US President George W. Bush says he is “disturbed” by Iran’s refusal to provide any information on Levinson. “I call on Iran’s leaders to tell us what they know about his whereabouts.”

    December 2007 – Levinson’s wife, Christine Levinson, meets with government officials in Iran, but does not learn anything about her husband’s disappearance.

    2008 – The CIA pays the Levinson family more than $2 million to head off a lawsuit, according to family attorney David McGee.

    March 3, 2011 – US Secretary of State Hillary Clinton says that evidence is growing that Levinson is alive and being held somewhere in southwest Asia.

    December 2011 – The Levinson family publicly releases a “proof of life” video they received in November 2010. In the video, Levinson says, “I have been treated well, but I need the help of the United States government to answer the requests of the group that has held me for three-and-a-half years. And please help me get home. Thirty-three years of service to the United States deserves something. Please help me.”

    March 6, 2012 – The FBI offers a $1 million reward for information leading to his safe return.

    September 2012 – Christine Levinson attempts to meet with Iranian President Mahmoud Ahmadinejad during the UN General Assembly in New York. He does not meet with her but tells CNN, “They told me (Levinson) was in Iran, and of course the question came up in my mind, what was an American intelligence officer doing in Iran…an individual is lost, how are we supposed to find him among 7 billion people spread across the globe? What we can do is assist, help and cooperate, which we have been doing, and we are doing… as a humanitarian gesture and action.”

    January 2013 – The Levinson family releases a series of photographs they received in April 2011. In the photos, a bearded, shackled Levinson, wearing an orange jumpsuit, holds signs written in broken English.

    September 27, 2013 – US President Barack Obama speaks by phone with Iranian President Hassan Rouhani. One of the topics discussed is Levinson.

    December 12, 2013 – The Associated Press and The Washington Post report that Levinson was working for the CIA when he disappeared in 2007, possibly investigating corruption among Iranian officials. The AP says it first learned of Levinson’s CIA ties in 2010 but delayed publishing the information at the government’s request. The next day the New York Times reports it has known of Levinson’s CIA work since 2007 but also delayed publishing the information to avoid jeopardizing his safety.

    December 13, 2013 – White House Spokesman Jay Carney says Levinson “was not a US government employee when he went missing in Iran.”

    December 2013 – Salahuddin, the last person to acknowledge seeing Levinson, tells the Christian Science Monitor that both he and Levinson were detained by Iranian police on March 9, 2007.

    January 21, 2014 – In an interview with CNN, Levinson’s family discloses that they have known for some time that he was working for the CIA. They accuse the US government of failing to do enough to find Levinson.

    March 9, 2015 – The FBI increases the reward for information on Levinson to $5 million.

    February 11, 2016 – The Senate passes a resolution recognizing that Levinson is the longest held US civilian in US history and urges Iran to “act on its promises to assist in the case of Robert Levinson.”

    March 21, 2017 – Levinson’s family files a lawsuit against Iran with the US District Court in Washington, DC. The complaint states that the family is filing suit under the Foreign Sovereign Immunities Act “for injuries suffered by each of them as a result of Iran’s unlawful acts of hostage taking, torture and other torts.”

    November 4, 2019 – The Department of State Rewards for Justice Program announces a reward of up to $20 million for information leading to the safe return of Levinson, in addition to the FBI’s previously announced reward of $5 million.

    March 9, 2020 – On the 13th anniversary of Levinson’s abduction, the FBI renews its “repeated calls to Iran to uphold its prior commitments to cooperate and to share information which could lead to Bob’s return.”

    March 25, 2020 – The family of Levinson announces that they believe he is dead. “We recently received information from U.S. officials that has led both them and us to conclude that our wonderful husband and father died while in Iranian custody,” they said in a statement.

    October 1, 2020 – A US court orders the government of Iran to pay more than $1.4 billion to Levinson’s family for compensatory and punitive damages.

    December 14, 2020 – Senior US government officials say they have identified and sanctioned two senior Iranian intelligence officials who were involved in the abduction and “probable death” of Levinson.

    [ad_2]

    Source link

  • David Petraeus Fast Facts | CNN

    David Petraeus Fast Facts | CNN

    [ad_1]

    Here is a look at the life of David Petraeus, former director of the Central Intelligence Agency (CIA).

    Birth date: November 7, 1952

    Birth place: Cornwall, New York

    Birth name: David Howell Petraeus

    Father: Sixtus Petraeus, Danish-born sea captain

    Mother: Miriam (Howell) Petraeus

    Marriage: Hollister “Holly” Knowlton (July 6, 1974-present)

    Children: Anne and Stephen

    Education: US Military Academy – West Point, B.S., 1974; Princeton University, M.P.A., International Relations, 1985; Princeton University, Ph.D., International Relations, 1987

    Military: US Army, 1974-2011, four-star general

    Growing up in Cornwall-on-Hudson, New York, friends nicknamed Petraeus “Peaches.”

    1974 – Is commissioned as an infantry officer in the US Army upon graduation from West Point.

    1975-1979 Platoon leader, adjutant, 1st Battalion, 509th Airborne Battalion Combat Team in Vicenza, Italy.

    1979-1982 Commander, then aide de camp, 24th Infantry Division (Mechanized) at Fort Stewart, Georgia.

    1985-1987 – Instructor, then Assistant Professor of Social Sciences, US Military Academy at West Point.

    1987-1988 – Military Assistant to the Supreme Allied Commander Europe, NATO, Brussels, Belgium.

    1989 Serves as aide to the Army’s chief of staff.

    1991Is shot in the chest during a training exercise at Fort Campbell, Kentucky.

    1991-1993 – Commander, 3rd Battalion of the 187th Infantry Regiment, 101st Airborne Division.

    1995-1997Commander, 1st Brigade, 82nd Airborne Division.

    2000Breaks his pelvis during a parachute jump.

    2000-2001 – Chief of staff, XVIII Airborne Corps., US Army, Fort Bragg, North Carolina.

    2000Is promoted to brigadier (one star) general.

    2001-2002 – Serves in Bosnia as the assistant chief of staff for military operations of the NATO Stabilization Force.

    2002-2004 – Commanding general of the 101st Airborne Division US Army, Fort Campbell, Kentucky.

    March 2003 – Leads troops into battle as commander of the 101st Airborne Division during the US-led invasion of Iraq.

    June 2004-September 2005 – Commander of the Multinational Security Transition Command in Iraq.

    October 2005-2007 – Commanding general of the Combined Arms Center, US Army, Fort Leavenworth, Kansas.

    February 2007-September 2008 – Commander of all coalition forces in Iraq.

    October 31, 2008-July 4, 2010 – Commander in Chief of Central Command.

    October 6, 2009 – Announces that he was diagnosed with early-stage prostate cancer and underwent two months of radiation treatment.

    June 15, 2010 – Becomes “a little lightheaded” and faints while testifying at a Senate Armed Services Committee hearing.

    July 4, 2010-July 18, 2011 – Commander of US and NATO forces in Afghanistan.

    April 28, 2011 – Nominated by President Barack Obama to replace Leon Panetta as CIA director.

    June 30, 2011 – Unanimously confirmed by the US Senate as the next director of the CIA.

    July 18, 2011 – Petraeus turns over command of US and NATO forces in Afghanistan to Gen. John R. Allen.

    August 31, 2011 – Retires from the Army.

    September 6, 2011 – Petraeus is sworn in as the new director of the CIA.

    November 9, 2012 – Petraeus submits his resignation to President Obama, citing personal reasons and admits he had an extramarital affair.

    March 27, 2013 – Publicly apologizes for his extramarital affair during a speech at the University of Southern California.

    May 30, 2013 – It is announced that Petraeus has joined private equity firm KKR as the chairman of a new global institute.

    July 1, 2013 – Joins the University of Southern California faculty as a Judge Widney Professor, “a title reserved for eminent individuals from the arts, sciences, professions, business, and community and national leadership.”

    January 9, 2015 – A federal law enforcement official tells CNN that Justice Department prosecutors are recommending charges be filed against Petraeus for disclosure of classified information to his former lover Paula Broadwell who was working on a book with Petraeus at the time.

    March 3, 2015 – Pleads guilty to one federal charge of removing and retaining classified information as part of a plea deal. According to court documents, Petraeus admitted removing several so-called black books – notebooks in which he kept classified and non-classified information from his tenure as the commander of the International Security Assistance Force in Afghanistan – and giving them to Broadwell.

    March 16, 2015 – White House Press Secretary Josh Earnest confirms that the National Security Council and the Obama administration have consulted with Petraeus on matters related to Iraq and ISIS.

    April 23, 2015 – Petraeus is sentenced to serve two years probation and fined $100,000 for sharing classified information with his biographer and lover, Broadwell. Prosecutors agree to not send him to jail because the classified information was never released to the public or published in the biography.

    September 22, 2015 – Petraeus speaks before the Senate Armed Services Committee regarding the US’s Middle East policy. He begins this, his first public hearing since his resignation, with a formal apology for the indiscretions that led to his resignation.

    June 10, 2016 – Along with retired NASA astronaut Mark Kelly, announces that they are launching Veterans Coalition for Common Sense to encourage elected leaders to “do more to prevent gun tragedies.”

    June 12, 2019 The University of Birmingham announces that Petraeus has accepted an honorary professorship in the Institute for Conflict, Cooperation and Security. The three-year position begins immediately.

    [ad_2]

    Source link

  • Huawei wants to go all in on AI for the next decade | CNN Business

    Huawei wants to go all in on AI for the next decade | CNN Business

    [ad_1]

    Editor’s Note: Sign up for CNN’s Meanwhile in China newsletter which explores what you need to know about the country’s rise and how it impacts the world.


    Hong Kong
    CNN
     — 

    Huawei has joined the list of companies that want to be all about artificial intelligence.

    For the first time in about 10 years, the Chinese tech and telecoms giant announced its new strategic direction on Wednesday, saying it would shift its focus to AI. Previously, the company had prioritized cloud computing and intellectual property, respectively, over two decade-long periods.

    Meng Wanzhou, Huawei’s rotating chairwoman and chief financial officer, made the announcement in Shanghai during a company event.

    “As artificial intelligence gains steam, and its impact on industry continues to grow, Huawei’s All Intelligence strategy is designed to help all industries make the most of new strategic opportunities,” the company said in a statement.

    Meng said in a speech that Huawei was “committed to building a solid computing backbone for China — and another option for the world.”

    “Our end goal is to help meet the diverse AI computing needs of different industries,” she added, without providing details.

    Huawei’s decision follows a similar move by fellow Chinese tech giant Alibaba (BABA), announced earlier this month, to prioritize AI.

    Other companies, such as Japan’s SoftBank, have also long declared an intent to focus more on the fast-moving technology, and more businesses have jumped on the bandwagon this year due to excitement about platforms such as GPT-4.

    Meng returned to China in September 2021 after spending nearly three years under house arrest in Canada as part of an extradition battle with the United States. She and Huawei had been charged for alleged bank fraud and evasion of economic sanctions against Iran.

    The executive, who is also the daughter of Huawei founder Ren Zhengfei, was able to leave after reaching an agreement with the US Department of Justice and ultimately having her charges dismissed.

    Meng began her role as the rotating chairperson of the company in April and is expected to stay in the position for six months.

    News of Huawei’s strategic update came the same day the company was mentioned in allegations lodged by China against the United States.

    In a statement posted Wednesday on Chinese social network WeChat, China’s Ministry of State Security accused Washington of infiltrating Huawei servers nearly 15 years ago.

    “With its powerful arsenal of cyberattacks, the United States intelligence services have carried out surveillance, theft of secrets and cyberattacks against many countries around the world, including China, in a variety of ways,” the ministry said.

    It alleged that the US National Security Agency (NSA), in particular, had “repeatedly conducted systematic and platform-based attacks on China in an attempt to steal China’s important data resources.”

    Huawei declined to comment on the allegations, while the NSA did not immediately respond to a request for comment outside regular US business hours.

    The claims are especially notable because US officials have long suspected the company of spying on the networks that its technology operates, using it as grounds to restrict trade with the company. Huawei has vehemently denied the claims, saying it operates independently of the Chinese government.

    In 2019, Huawei was added to the US “entity list,” which restricts exports to select organizations without a US government license. The following year, the US government expanded on those curbs by seeking to cut Huawei off from chip suppliers that use US technology.

    In recent weeks, Huawei has added to US-China tensions again after launching a new smartphone that represents an apparent technological breakthrough.

    Huawei launched the Mate 60 Pro, its latest flagship device, last month, prompting a US investigation. Analysts who have examined the phone have said it includes a 5G chip, suggesting Huawei may have found a way to overcome American export controls.

    — Mengchen Zhang contributed to this report.

    [ad_2]

    Source link

  • As Beijing’s intelligence capabilities grow, spying becomes an increasing flashpoint in US-China ties | CNN

    As Beijing’s intelligence capabilities grow, spying becomes an increasing flashpoint in US-China ties | CNN

    [ad_1]


    Hong Kong
    CNN
     — 

    For the second time this year, concerns of Chinese spying on the United States have cast a shadow over a planned visit to China by the US’ top diplomat as the two superpowers try to improve fractured ties while keeping a watchful eye on each other.

    US Secretary of State Antony Blinken is expected to land in Beijing over the weekend following the postponement of his earlier trip planned for February after a Chinese surveillance balloon meandered across the continental US, hovering over sensitive military sites before being shot down by an American fighter plane.

    But with Blinken poised to make a trip seen as a key step to mend fractured US-China communications, another espionage controversy has flared in recent days following media reports that China had reached a deal to build a spy perch on the island of Cuba.

    Beijing has said it wasn’t “aware” of the situation, while the White House said the reports were not accurate – with Blinken earlier this week saying China upgraded its spying facilities there in 2019.

    The situation is just the latest in a string of allegations of spying between the two in recent months. They underscore how intelligence gathering – an activity meant to go on without detection, out of the public eye – is becoming an increasingly prominent flashpoint in the US-China relationship.

    CIA Director Bill Burns secretly traveled to China in May to meet counterparts and emphasize the importance of maintaining open lines of communication in intelligence channels, CNN reported earlier this month.

    “Crisis communications are arguably in their worst state since 1979. This puts a premium on both countries’ ability to gather intelligence to understand each other’s capabilities, actions, and strategic intent around the globe,” said Lyle Morris, a senior fellow at the Asia Society Policy Institute’s Center for China Analysis.

    That pushes intelligence gathering itself to become “another factor that is complicating US-China relations,” he said.

    That’s especially the case, experts say, as China continues to expand its own intelligence gathering capabilities – catching up in an area where the US has traditionally had an edge.

    “It’s fair to say that we’ve been spying on each other at various scales for a long time,” said former Central Intelligence Agency (CIA) China analyst Christopher Johnson.

    “No doubt there’s been an uptick from both sides, but probably more so on the Chinese side, simply because they’ve gotten larger, more influential, richer, and therefore have more resources to devote than they did in the past,” said Johnson, who is now president of the China Strategies Group consultancy.

    Chinese leader Xi Jinping has also pursued a far more assertive foreign policy than his predecessors during his past decade in power.

    That’s been accompanied by “a consistent emphasis on enhancing intelligence capabilities, modernizing technology, and improving coordination among different security agencies,” according to Xuezhi Guo, a professor of political science at Guilford College in the US.

    China’s main intelligence activities fall under departments within the People’s Liberation Army and its vast civilian agency known as the Ministry of State Security (MSS). Other arms of the Communist Party apparatus also play a role in activities beyond conventional intelligence gathering, experts say.

    The MSS, established in 1983, oversees intelligence and counterintelligence both within China and overseas. Its remit has encouraged analogies to a combined CIA and Federal Bureau of Intelligence. But the sprawling Beijing-headquartered MSS is even more secretive – without even a public website describing its activities.

    The agency is “expected to play an even more significant role in China’s domestic and international security and stability” in the coming years, amid mounting challenges at home and abroad, Guo said.

    In the context of both China’s growing clout and geopolitical frictions, experts say it’s no surprise Beijing is allegedly seeking to establish or expand surveillance facilities in Cuba – or other places around the world – with the US as a key target, but not the only one.

    Meanwhile, intelligence gathering in China has become harder.

    Xi has consolidated his power and become increasingly focused on security – including building out the state’s ability to monitor its citizens, both online and through China’s extensive surveillance infrastructure.

    “The task of collecting intelligence in China is arguably harder than ever and yet more necessary than ever,” said Johnson, the former analyst, pointing to challenges of gaining insight into the government under the centralized leadership of Xi, who maintains a “very small circle of knowledge or trust.”

    China’s building of a domestic “surveillance panopticon” has also enabled its counter-intelligence, according to Johnson.

    US intelligence has difficulties having operational meetings or “going black” (dodging surveillance) within China, he said, especially during the Covid-19 pandemic when movement was tightly controlled and even more digitally monitored than usual.

    CIA operations also suffered a staggering setback starting in 2010, according to The New York Times, when the Chinese government killed or imprisoned more than a dozen sources over two years.

    In 2021, CNN reported that the agency was overhauling how it trains and manages its network of spies as part of a broad transition to focus more closely on adversaries like China and Russia.

    A tower of security cameras near Shanghai's Lujiazui financial district in May.

    This contrasts with what some US lawmakers and commentators believe has been a too relaxed approach to national security with regards to China, where even private businesses are beholden to the ruling Communist Party, which also seeks to keep tabs on its citizens overseas.

    Experts have also warned about the overlap between espionage efforts and operations like those of China’s United Front – a sprawling network of groups that manage the party’s relationship with non-party industries, organizations and individuals around the world.

    Heightened concern and awareness about Chinese intelligence gathering – or the potential for it – has exploded in the US in recent years.

    That’s played out in debates about the use of Chinese telecoms equipment and social media platforms – think Huawei and TikTok – as well as in government efforts to prosecute economic espionage cases and prevent any influence campaigns from impacting American democracy.

    Beijing has said repeatedly that it does not interfere in the “internal affairs” of other countries. Both Huawei and Tiktok have repeatedly denied that their products present a national security risk or would be accessed by the Chinese government.

    In the US, there’s also been concern about over-hyping the threat and sparking anti-Chinese sentiment.

    The US Justice Department last year ended its 3-year-old China Initiative, a national security program largely focused on thwarting technology theft, including in academia, after a string of cases were dismissed amid concerns of fueling suspicion and bias against Chinese Americans.

    US intellectual property had long been a traditional target of Chinese espionage.

    A survey of 224 reported instances of Chinese espionage directed at the United States since 2000, conducted using open source data by the Center for Strategic and International Studies (CSIS) think tank in Washington, found nearly half involved cyber-espionage, while over half were seeking to acquire commercial technologies.

    Beijing appears to be increasingly pushing back on what it sees as a double standard – as the US’ international surveillance efforts have also been well-documented.

    The 2013 leak produced by former National Security Agency contractor Edward Snowden, for example, revealed Washington’s vast global digital surveillance capabilities, against both rivals and allies alike. Meanwhile, the US intelligence community is widely understood to have its own overseas facilities for collecting signals intelligence.

    Last month, Beijing released a report from a national cybersecurity agency titled “‘Empire of Hacking’: The US Central Intelligence Agency.” It accused the US of promoting the internet in the 1980s in order to further its intelligence agencies’ efforts to launch “Color Revolutions” and overthrow governments abroad.

    “The organizations, enterprises and individuals that use the Internet equipment and software products of the USA have been used as the puppet ‘agents’ by CIA, helping it to be a ‘shining star’ in global cyber espionage wars,” the report also claimed.

    China’s own internet is heavily censored with access limited by a “Great Firewall” – part of its extensive efforts to control the flow of information alongside its extensive digital surveillance of its own population.

    China’s Foreign Ministry last month again pointed its finger at the US after Washington released a warning alleging that a Chinese state-sponsored hacker had infiltrated networks across US critical infrastructure sectors.

    Earlier this month, the ministry also slammed the US for sending what it said were more than 800 flights of large reconnaissance aircraft “to spy on China” last year – though no assertion was made of crossing into Chinese airspace.

    The comment came after each country’s military accused the other of misbehavior after a Chinese fighter jet intercepted a US spy plane in international airspace over the South China Sea.

    TikTok CEO Shou Zi Chew testifies at a House Energy and Commerce Committee hearing on Capitol Hill in Washington, DC on Thursday, March 23, 2023.

    Experts say this rhetorical back-and-forth over each other’s clandestine activities is likely only to continue as US-China competition drives both to ramp up their intelligence gathering – and China continues to expand its own prowess, including through technological advancements such as satellite networks, surveillance balloons and data processing.

    “China increasingly has capabilities (that the US has been known for) … this is moving from a one way street historically to a two-way street,” said John Delury, author of “Agents of Subversion: The Fate of John T. Downey and the CIA’s Covert War in China.”

    He pointed to how China had long been subject to US offshore surveillance and – prior to the restoration of diplomatic relations in the 1970s – direct aerial surveillance.

    “There’s a psychological dimension to this as well,” Delury added, noting that the spy balloon incident earlier this year brought this to the fore – giving Americans the unnerving sense that China “can do this to us now, they have technical capabilities and can look at us.”

    Meanwhile, there’s much at stake in how well the two governments can repair official communication – seen as a key element of Blinken’s expected visit on Sunday and Monday.

    “When there’s less communication, the two intelligence communities inside the two governments have to do more and more guesswork,” said Delury. “Then there’s a lot more room for faulty assumptions.”

    [ad_2]

    Source link

  • A man told officers at the CIA headquarters gate, ‘I’m here and I have a gun,’ law enforcement source says | CNN

    A man told officers at the CIA headquarters gate, ‘I’m here and I have a gun,’ law enforcement source says | CNN

    [ad_1]



    CNN
     — 

    A man now under arrest walked up to the CIA Headquarters’ gate Tuesday and allegedly said, “I’m here and I have a gun,” a law enforcement source told CNN.

    Uniformed federal officers turned him away and notified Fairfax County, Virginia, police of his description, the source said Wednesday.

    He later was arrested and charged with felony possession of a firearm on school property, police said. He was identified as Eric Sandow, 32, of Gainesville, Florida.

    Sandow said he was headed to the CIA and had an AK-47 and another weapon in his vehicle as he was arrested Tuesday at Dolley Madison Preschool in McLean, Virgnia, after he trespassed on school grounds around 11 a.m., police said.

    The preschool is less than 1.5 miles from CIA Headquarters and about a 10-minute drive to major Washington, DC, landmarks, including the National Mall.

    “He requested access to the (preschool) building facilities to use the restroom, which was denied by school staff,” Dolley Madison Preschool said in a statement Wednesday. “At no point did he gain physical entrance to the school building.”

    Fairfax County police were then called to the scene. “While speaking with him, he made statements he had weapons inside his car located on school property,” the police department said Wednesday in a statement.

    “Officers searched the car and found two weapons, an AK-47 and a pistol, along with magazines and ammunition.”

    Sandow was arraigned Wednesday morning in Fairfax County General District Court, a court official said.

    He was being held Wednesday without bond, police said. It was not immediately clear whether Sandow had legal representation.

    “It does not appear he was acting in conjunction with anyone else,” Fairfax County police said. “Sandow did not make any threats and the weapons never left the vehicle.”

    Sandow does not appear to have a lengthy criminal history, public records show. He was charged with misdemeanor domestic battery in 2014 and did not declare a political party with his voter registration.

    Law enforcement lauded an alert person who summoned them Tuesday to the day care.

    “We’re grateful to the community member who did the right thing and called us,” police said. “We’d like to remind our community to report suspicious activity as you never know what you may prevent by making that call.”

    [ad_2]

    Source link

  • TikTok collects a lot of data. But that’s not the main reason officials say it’s a security risk | CNN Business

    TikTok collects a lot of data. But that’s not the main reason officials say it’s a security risk | CNN Business

    [ad_1]



    CNN
     — 

    After TikTok CEO Shou Chew testified for more than five hours on Thursday before a Congressional committee, one thing was clear: US lawmakers remain convinced that TikTok is an urgent threat to national security.

    The hearing, Chew’s first appearance before Congress, kicked off with a lawmaker calling for TikTok to be banned and remained combative throughout. A number of lawmakers expressed deep skepticism about TikTok’s efforts to safeguard US user data and ease concerns about its ties to China. Nothing Chew said appeared to move the needle.

    The rhetoric inside and outside the hearing room highlighted the growing, bipartisan momentum for cracking down on the app in the United States. As the hearing was taking place, House Speaker Kevin McCarthy said he supports legislation that would effectively ban TikTok; Secretary of State Antony Blinken said TikTok should be “ended one way or another,” and the Treasury Department issued a statement vowing to “safeguard national security,” without mentioning TikTok by name.

    Concerns about TikTok’s connections to China have led governments worldwide to ban the app on official devices, and those fears have factored into the increasingly tense US-China relationship. But the remarks across the federal government on Thursday, combined with a prior threat from the Biden administration to impose a nationwide ban unless TikTok’s Chinese owners sell their stakes, shows that a complete ban of the hugely popular app very much remains a live possibility.

    However, more than two years after the Trump administration first issued a similar threat to TikTok, evidence remains unclear about whether the app is a national security threat. Security experts say the government’s fears, while serious, currently appear to reflect only the potential for TikTok to be used for foreign intelligence, not that it has been. There is still no public evidence the Chinese government has actually spied on people through TikTok.

    TikTok doesn’t operate in China. But since the Chinese government enjoys significant leverage over businesses under its jurisdiction, the theory goes that ByteDance, and thus indirectly, TikTok, could be forced to cooperate with a broad range of security activities, including possibly the transfer of TikTok data.

    “It’s not that we know TikTok has done something, it’s that distrust of China and awareness of Chinese espionage has increased,” said James Lewis, an information security expert at the Center for Strategic and International Studies. “The context for TikTok is much worse as trust in China vanishes.”

    When Rob Joyce, the National Security Agency’s director of cybersecurity, was asked by reporters in December to articulate his security concerns about TikTok, he offered a general warning rather than a specific allegation.

    “People are always looking for the smoking gun in these technologies,” Joyce said. “I characterize it much more as a loaded gun.”

    Technical experts also draw a distinction between the TikTok app — which appears to operate very similarly to American social media in the amount of user tracking and data collection it performs — and TikTok’s approach to governance and ownership. It’s the latter that’s been the biggest source of concern, not the former.

    The US government has said it’s worried China could use its national security laws to access the significant amount of personal information that TikTok, like most social media applications, collects from its US users.

    The laws in question are extraordinarily broad, according to western legal experts, requiring “any organization or citizen” in China to “support, assist and cooperate with state intelligence work,” without defining what “intelligence work” means.

    Should Beijing gain access to TikTok’s user data, one concern is that the information could be used to identify intelligence opportunities — for example, by helping China uncover the vices, predilections or pressure points of a potential spy recruit or blackmail target, or by building a holistic profile of foreign visitors to the country by cross-referencing that data against other databases it holds. Even if many of TikTok’s users are young teens with seemingly nothing to hide, it’s possible some of those Americans may grow up to be government or industry officials whose social media history could prove useful to a foreign adversary.

    Another concern is that if China has a view into TikTok’s algorithm or business operations, it could try to exert pressure on the company to shape what users see on the platform — either by removing content through censorship or by pushing preferred content and propaganda to users. This could have enormous repercussions for US elections, policymaking and other democratic discourse.

    Security experts say these scenarios are a possibility based on what’s publicly known about China’s laws and TikTok’s ownership structure, but stress that they are hypothetical at best. To date, there is no public evidence that Beijing has actually harvested TikTok’s commercial data for intelligence or other purposes.

    Chew, the TikTok CEO, has publicly said that the Chinese government has never asked TikTok for its data, and that the company would refuse any such request. In Thursday’s hearing, Chew said that what US officials fear is a hypothetical scenario that has not been proven.

    “I think a lot of risks that are pointed out are hypothetical and theoretical risks,” Chew said. “I have not seen any evidence. I am eagerly awaiting discussions where we can talk about evidence and then we can address the concerns that are being raised.”

    If there’s a risk, it’s primarily concentrated in the relationship between TikTok’s Chinese parent, ByteDance, and Beijing. The main issue is that the public has few ways of verifying whether or how that relationship, if it exists, might have been exploited.

    TikTok has been erecting technical and organizational barriers that it says will keep US user data safe from unauthorized access. Under the plan, known as Project Texas, the US government and third-party companies such as Oracle would also have some degree of oversight of TikTok’s data practices. TikTok is working on a similar plan for the European Union known as Project Clover.

    But that hasn’t assuaged the doubts of US officials. Multiple lawmakers at the hearing specifically said they were not persuaded by Project Texas. That’s likely because no matter what TikTok does internally, China would still theoretically have leverage over TikTok’s Chinese owners. Exactly what that implies is ambiguous, and because it is ambiguous, it is unsettling.

    In congressional testimony, TikTok has sought to assure US lawmakers it is free from Chinese government influence, but it has not spoken to the degree that ByteDance may be susceptible. TikTok has also acknowledged that some China-based employees have accessed US user data, though it’s unclear for what purpose, and it has disclosed to European users that China-based employees may access their data as part of doing their jobs.

    Multiple privacy and security researchers who’ve examined TikTok’s app say there aren’t any glaring flaws suggesting the app itself is currently spying on people or leaking their information.

    In 2020, The Washington Post worked with a privacy researcher to look under the hood at TikTok, concluding that the app does not appear to collect any more data than your typical mainstream social network. The following year, Pellaeon Lin, a Taiwan-based researcher at the University of Toronto’s Citizen Lab, performed another technical analysis that reached similar conclusions.

    But even if TikTok collects about the same amount of information as Facebook or Twitter, that’s still quite a lot of data, including information about the videos you watch, comments you write, private messages you send, and — if you agree to grant this level of access — your exact geolocation and contact lists. TikTok’s privacy policy also says the company collects your email address, phone number, age, search and browsing history, information about what’s in the photos and videos you upload, and if you consent, the contents of your device’s clipboard so that you can copy and paste information into the app.

    TikTok’s source code closely resembles that of its China-based analogue, Douyin, said Lin in an interview. That implies both apps are developed on the same code base and customized for their respective markets, he said. Theoretically, TikTok could have “privacy-violating hidden features” that can be turned on and off with a tweak to its server code and that the public might not know about, but the limitations of trying to reverse-engineer an app made it impossible for Lin to find out whether those configurations or features exist.

    If TikTok used unencrypted communications protocols, or if it tried to access contact lists or precise geolocation data without permission, or if it moved to circumvent system-level privacy safeguards built into iOS or Android, then that would be evidence of a problem, Lin said. But he found none of those things.

    “We did not find any overt vulnerabilities regarding their communication protocols, nor did we find any overt security problems within the app,” Lin said. “Regarding privacy, we also did not see the TikTok app exhibiting any behaviors similar to malware.”

    TikTok has cited Lin’s research as part of its defense. But Citizen Lab came out swinging this week at the company’s characterizations of the paper, saying in a statement that TikTok has presented the research as “somehow exculpatory” when a key finding was that Lin couldn’t see what happens to user data after it is collected.

    Chew, in a rare moment of apparent frustration, told lawmakers at the hearing that TikTok and Citizen Lab were really saying a version of the same thing. “Citizen Lab is saying they cannot prove a negative, which is what I’ve been trying to do for the last four hours,” he said.

    TikTok has faced claims that its in-app browser tracks its users’ keyboard entries, and that this type of conduct, known as keylogging, could be a security risk. The privacy researcher who performed the analysis last year, Felix Krause, said that keylogging is not an inherently malicious activity, but it theoretically means TikTok could collect passwords, credit card information or other sensitive data that users may submit to websites when they visit them through TikTok’s in-app browser.

    There is no public evidence TikTok has actually done that, however. TikTok has said the keylogging function is used for “debugging, troubleshooting, and performance monitoring,” as well as to detect bots and spam. Other research has shown that the use of keyloggers is extremely widespread in the technology industry. That does not necessarily excuse TikTok or its peers for using a keylogger in the first place, but neither is it proof positive that TikTok’s product, by itself, is any more of a national security threat than other websites.

    There have also been a number of studies that report TikTok is tracking users around the internet even when they are not using the app. By embedding tracking pixels on third-party websites, TikTok can collect information about a website’s visitors, the studies have found. TikTok has said it uses the data to bolster its advertising business. And in this respect, TikTok is not unique: the same tool is used by US tech giants including Facebook-parent Meta and Google on a far larger scale, according to Malwarebytes, a leading cybersecurity firm.

    At the hearing, Chew said the company does keystroke logging to “identify bots,” not to track what users say. He also repeatedly noted that TikTok does not collect more user data than most of its peers in the industry.

    As with the keylogging tech, the fact TikTok uses tracking pixels does not on its own transform the company into a national security threat; the risk is that the Chinese government could compel or influence TikTok, through ByteDance, to abuse its data collection capabilities.

    Separately, a report last year found TikTok was spying on journalists, snooping on their user data and IP addresses to find out when or if certain reporters were sharing the same location as company employees. TikTok later confirmed the incident and ByteDance fired several employees who had improperly accessed the TikTok data of two journalists.

    The circumstances surrounding the incident suggest it was not the type of wide-scale, government-directed intelligence effort that US national security officials primarily fear. Instead, it appeared to be part of a specific internal effort by some ByteDance employees to hunt down leaks to the press, which may be deplorable but hardly uncommon for an organization under public scrutiny. (Nevertheless, the US government is reportedly investigating the incident.)

    Joyce, the NSA’s top cyber official, told reporters in December that what he really worries about is “large-scale influence” campaigns leveraging TikTok’s data, not “individualized targeting through [TikTok] to do malicious things.”

    To date, however, there’s no public evidence of that taking place.

    TikTok may collect an extensive amount of data, much of it quietly, but as far as researchers can tell, it isn’t any more invasive or illegal than what other US tech companies do.

    According to security experts, that’s more a reflection of the broad leeway we’ve given to tech companies in general to handle our data, not an issue that’s unique or specific to TikTok.

    “We have to trust that those companies are doing the right thing with the information and access we’ve provided them,” said Peiter “Mudge” Zatko, a longtime ethical hacker and Twitter’s former head of security who turned whistleblower. “We probably shouldn’t. And this comes down to a concern about the ultimate governance of these companies.”

    Lin told CNN that TikTok and other social media companies’ appetite for data highlights policy failures to pass strong privacy laws that regulate the tech industry writ large.

    “TikTok is only a product of the entire surveillance capitalism economy,” Lin said. “And governments around the world are ignoring their duty to protect citizens’ private information, allowing big tech companies to exploit user information for gain. Governments should try to better protect user information, instead of focusing on one particular app without good evidence.”

    Asked how he would advise policymakers to look at TikTok instead, Lin said: “What I would call for is more evidence-based policy.”

    [ad_2]

    Source link

  • Lawmakers say TikTok is a national security threat, but evidence remains unclear | CNN Business

    Lawmakers say TikTok is a national security threat, but evidence remains unclear | CNN Business

    [ad_1]



    CNN
     — 

    As TikTok CEO Shou Zi Chew prepares for his first congressional grilling on Thursday, much of the focus will undoubtedly be on the short-form video app’s potential national security risks.

    Concerns about TikTok’s connections to China have led governments worldwide to ban the app on official devices, and those fears have factored into the increasingly tense US-China relationship. The Biden administration has threatened TikTok with a nationwide ban unless its Chinese owners sell their stakes in the company.

    But more than two years after the Trump administration first issued a similar threat to TikTok, security experts say the government’s fears, while serious, currently appear to reflect only the potential for TikTok to be used for foreign intelligence, not that it has been. There is still no public evidence the Chinese government has actually spied on people through TikTok.

    TikTok doesn’t operate in China. But since the Chinese government enjoys significant leverage over businesses under its jurisdiction, the theory goes that ByteDance, and thus indirectly, TikTok, could be forced to cooperate with a broad range of security activities, including possibly the transfer of TikTok data.

    “It’s not that we know TikTok has done something, it’s that distrust of China and awareness of Chinese espionage has increased,” said James Lewis, an information security expert at the Center for Strategic and International Studies. “The context for TikTok is much worse as trust in China vanishes.”

    When Rob Joyce, the National Security Agency’s director of cybersecurity, was asked by reporters in December to articulate his security concerns about TikTok, he offered a general warning rather than a specific allegation.

    “People are always looking for the smoking gun in these technologies,” Joyce said. “I characterize it much more as a loaded gun.”

    Technical experts also draw a distinction between the TikTok app — which appears to operate very similarly to American social media in the amount of user tracking and data collection it performs — and TikTok’s approach to governance and ownership. It’s the latter that’s been the biggest source of concern, not the former.

    The US government has said it’s worried China could use its national security laws to access the significant amount of personal information that TikTok, like most social media applications, collects from its US users.

    The laws in question are extraordinarily broad, according to western legal experts, requiring “any organization or citizen” in China to “support, assist and cooperate with state intelligence work,” without defining what “intelligence work” means.

    Should Beijing gain access to TikTok’s user data, one concern is that the information could be used to identify intelligence opportunities — for example, by helping China uncover the vices, predilections or pressure points of a potential spy recruit or blackmail target, or by building a holistic profile of foreign visitors to the country by cross-referencing that data against other databases it holds. Even if many of TikTok’s users are young teens with seemingly nothing to hide, it’s possible some of those Americans may grow up to be government or industry officials whose social media history could prove useful to a foreign adversary.

    Another concern is that if China has a view into TikTok’s algorithm or business operations, it could try to exert pressure on the company to shape what users see on the platform — either by removing content through censorship or by pushing preferred content and propaganda to users. This could have enormous repercussions for US elections, policymaking and other democratic discourse.

    Security experts say these scenarios are a possibility based on what’s publicly known about China’s laws and TikTok’s ownership structure, but stress that they are hypothetical at best. To date, there is no public evidence that Beijing has actually harvested TikTok’s commercial data for intelligence or other purposes.

    Chew, the TikTok CEO, has publicly said that the Chinese government has never asked TikTok for its data, and that the company would refuse any such request.

    If there’s a risk, it’s primarily concentrated in the relationship between TikTok’s Chinese parent, ByteDance, and Beijing. The main issue is that the public has few ways of verifying whether or how that relationship, if it exists, might have been exploited.

    TikTok has been erecting technical and organizational barriers that it says will keep US user data safe from unauthorized access. Under the plan, known as Project Texas, the US government and third-party companies such as Oracle would also have some degree of oversight of TikTok’s data practices. TikTok is working on a similar plan for the European Union known as Project Clover.

    But that hasn’t assuaged the doubts of US officials, likely because no matter what TikTok does internally, China would still theoretically have leverage over TikTok’s Chinese owners. Exactly what that implies is ambiguous, and because it is ambiguous, it is unsettling.

    In congressional testimony, TikTok has sought to assure US lawmakers it is free from Chinese government influence, but it has not spoken to the degree that ByteDance may be susceptible. TikTok has also acknowledged that some China-based employees have accessed US user data, though it’s unclear for what purpose, and it has disclosed to European users that China-based employees may access their data as part of doing their jobs.

    Multiple privacy and security researchers who’ve examined TikTok’s app say there aren’t any glaring flaws suggesting the app itself is currently spying on people or leaking their information.

    In 2020, The Washington Post worked with a privacy researcher to look under the hood at TikTok, concluding that the app does not appear to collect any more data than your typical mainstream social network. The following year, Pellaeon Lin, a Taiwan-based researcher at the University of Toronto’s Citizen Lab, performed another technical analysis that reached similar conclusions.

    But even if TikTok collects about the same amount of information as Facebook or Twitter, that’s still quite a lot of data, including information about the videos you watch, comments you write, private messages you send, and — if you agree to grant this level of access — your exact geolocation and contact lists. TikTok’s privacy policy also says the company collects your email address, phone number, age, search and browsing history, information about what’s in the photos and videos you upload, and if you consent, the contents of your device’s clipboard so that you can copy and paste information into the app.

    TikTok’s source code closely resembles that of its China-based analogue, Douyin, said Lin in an interview. That implies both apps are developed on the same code base and customized for their respective markets, he said. Theoretically, TikTok could have “privacy-violating hidden features” that can be turned on and off with a tweak to its server code and that the public might not know about, but the limitations of trying to reverse-engineer an app made it impossible for Lin to find out whether those configurations or features exist.

    If TikTok used unencrypted communications protocols, or if it tried to access contact lists or precise geolocation data without permission, or if it moved to circumvent system-level privacy safeguards built into iOS or Android, then that would be evidence of a problem, Lin said. But he found none of those things.

    “We did not find any overt vulnerabilities regarding their communication protocols, nor did we find any overt security problems within the app,” Lin said. “Regarding privacy, we also did not see the TikTok app exhibiting any behaviors similar to malware.”

    TikTok has faced claims that its in-app browser tracks its users’ keyboard entries, and that this type of conduct, known as keylogging, could be a security risk. The privacy researcher who performed the analysis last year, Felix Krause, said that keylogging is not an inherently malicious activity, but it theoretically means TikTok could collect passwords, credit card information or other sensitive data that users may submit to websites when they visit them through TikTok’s in-app browser.

    There is no public evidence TikTok has actually done that, however. TikTok has said the keylogging function is used for “debugging, troubleshooting, and performance monitoring,” as well as to detect bots and spam. Other research has shown that the use of keyloggers is extremely widespread in the technology industry. That does not necessarily excuse TikTok or its peers for using a keylogger in the first place, but neither is it proof positive that TikTok’s product, by itself, is any more of a national security threat than other websites.

    There have also been a number of studies that report TikTok is tracking users around the internet even when they are not using the app. By embedding tracking pixels on third-party websites, TikTok can collect information about a website’s visitors, the studies have found. TikTok has said it uses the data to bolster its advertising business. And in this respect, TikTok is not unique: the same tool is used by US tech giants including Facebook-parent Meta and Google on a far larger scale, according to Malwarebytes, a leading cybersecurity firm.

    As with the keylogging tech, the fact TikTok uses tracking pixels does not on its own transform the company into a national security threat; the risk is that the Chinese government could compel or influence TikTok, through ByteDance, to abuse its data collection capabilities.

    Separately, a report last year found TikTok was spying on journalists, snooping on their user data and IP addresses to find out when or if certain reporters were sharing the same location as company employees. TikTok later confirmed the incident and ByteDance fired several employees who had improperly accessed the TikTok data of two journalists.

    The circumstances surrounding the incident suggest it was not the type of wide-scale, government-directed intelligence effort that US national security officials primarily fear. Instead, it appeared to be part of a specific internal effort by some ByteDance employees to hunt down leaks to the press, which may be deplorable but hardly uncommon for an organization under public scrutiny. (Nevertheless, the US government is reportedly investigating the incident.)

    Joyce, the NSA’s top cyber official, told reporters in December that what he really worries about is “large-scale influence” campaigns leveraging TikTok’s data, not “individualized targeting through [TikTok] to do malicious things.”

    To date, however, there’s no public evidence of that taking place.

    TikTok may collect an extensive amount of data, much of it quietly, but as far as researchers can tell, it isn’t any more invasive or illegal than what other US tech companies do.

    According to security experts, that’s more a reflection of the broad leeway we’ve given to tech companies in general to handle our data, not an issue that’s unique or specific to TikTok.

    “We have to trust that those companies are doing the right thing with the information and access we’ve provided them,” said Peiter “Mudge” Zatko, a longtime ethical hacker and Twitter’s former head of security who turned whistleblower. “We probably shouldn’t. And this comes down to a concern about the ultimate governance of these companies.”

    Lin told CNN that TikTok and other social media companies’ appetite for data highlights policy failures to pass strong privacy laws that regulate the tech industry writ large.

    “TikTok is only a product of the entire surveillance capitalism economy,” Lin said. “And governments around the world are ignoring their duty to protect citizens’ private information, allowing big tech companies to exploit user information for gain. Governments should try to better protect user information, instead of focusing on one particular app without good evidence.”

    Asked how he would advise policymakers to look at TikTok instead, Lin said: “What I would call for is more evidence-based policy.”

    [ad_2]

    Source link

  • NSA chief warns TikTok could censor videos as part of Chinese influence operations | CNN Business

    NSA chief warns TikTok could censor videos as part of Chinese influence operations | CNN Business

    [ad_1]


    Washington
    CNN
     — 

    US national security officials are concerned that TikTok could use its vast global reach to shape public opinion by either suppressing certain videos or promoting others, the head of the National Security Agency and US Cyber Command told lawmakers on Tuesday.

    “It’s not only the fact that you can influence something, but you can also turn off the message as well when you have such a large population of listeners,” Gen. Paul Nakasone said in testimony before the Senate Armed Services Committee.

    TikTok’s collection of data and its control over the algorithm that serves user content are also concerning, Nakasone said.

    Nakasone’s comments follow a directive from the White House that gives US federal agencies 30 days to remove TikTok from government-issued devices. And they come amid a major policy debate in Washington about what to do about one of the most popular apps among American youth.

    US officials have for years accused TikTok – and its Chinese parent firm ByteDance – of collecting data that could enable surveillance by the Chinese government. TikTok denies the allegations and has called on the Biden administration to finalize a national security deal that would allow TikTok to continue operating in the US in exchange for greater US government visibility into how it collects and stores data on Americans.

    A TikTok spokesperson said that the company has been working with the US government to address national security concerns.

    “Our status has been debated in public in a way that is divorced from the facts of that agreement and what we’ve achieved already. We will continue to do our part to deliver a comprehensive national security plan for the American people,” Brooke Oberwetter from TikTok said in statement.

    Some House lawmakers have pushed legislation that could effectively force the Biden administration to impose an outright ban on TikTok, but the prospects of that bill becoming law are slim.

    A bipartisan Senate bill that Virginia Democrat Mark Warner and South Dakota Republican John Thune are expected to unveil on Tuesday would give the Commerce Department authority to develop “mitigation measures,” up to and including a ban, to meet the risk posed by foreign-linked technologies.

    Like the US government push to ban hardware and other gear made by Huawei, another Chinese technology giant, US officials are often short on specifics when asked to show public proof of collusion between the Chinese government and ByteDance.

    “People are always looking for the smoking gun in these technologies,” NSA Cybersecurity Director Rob Joyce told reporters in December. “I characterize it much more as a loaded gun.”

    “I would not expect individualized targeting through [TikTok] to do malicious things,” Joyce said. “Where I’m concerned is the overall ability to do large-scale influence.”

    [ad_2]

    Source link

  • When China shot down five U-2 spy planes at the height of the Cold War | CNN

    When China shot down five U-2 spy planes at the height of the Cold War | CNN

    [ad_1]


    Seoul, South Korea
    CNN
     — 

    When a Chinese high-altitude balloon suspected of spying was spotted over the United States recently, the US Air Force responded by sending up a high-flying espionage asset of its own: the U-2 reconnaissance jet.

    It was the Cold-War era spy plane that took the high-resolution photographs – not to mention its pilot’s selfie – that reportedly convinced Washington the Chinese balloon was gathering intelligence and not, as Beijing continues to insist, studying the weather.

    In doing so, the plane played a key role in an event that sent tensions between the world’s two largest economies soaring, and shone an international spotlight on the methods the two governments use to keep tabs on each other.

    Until now, most of the media’s focus has been on the balloon – specifically, how a vessel popularly seen as a relic of a bygone era of espionage could possibly remain relevant in the modern spy’s playbook. Yet to many military historians, it is the involvement of that other symbol of a bygone time, the U-2, that is far more telling.

    The U-2 has a long and storied history when it comes to espionage battles between the US and China. In the 1960s and 1970s, at least five of them were shot down while on surveillance missions over China.

    Those losses haven’t been as widely reported as might be expected – and for good reason. The Central Intelligence Agency (CIA), which was responsible for all of America’s U-2s at the time the planes were shot down, has never officially explained what they were doing there.

    Adding to the mystery was that the planes were being flown not by US pilots nor under a US flag, but by pilots from Taiwan who, in a striking parallel to today’s balloon saga, claimed to be involved in a weather research initiative.

    That the CIA would be tight-lipped over what these American-built spy planes were doing is hardly surprising.

    But the agency’s continued silence more than 50 years later – it did not respond to a CNN request for comment on this article – speaks volumes about just how sensitive the issue was both at the time and remains today.

    The US government has a general rule of 25 years for automatic declassification of sensitive material. However, one of its often-cited reasons for ignoring this rule is in those cases where revealing the information would “cause serious harm to relations between the US and a foreign government, or to ongoing diplomatic activities of the US.”

    Contemporary accounts of what the planes were doing – by the Taiwan pilots who were shot down, retired US Air Force officers and military historians among them – leave little doubt as to why it would have caused a stir.

    The planes – according to accounts by the pilots in a Taiwan-made documentary film and histories published on US government websites – had been transferred to Taiwan as part of a top-secret mission to snoop on Communist China’s growing military capabilities, including its nascent nuclear program, which was receiving help from the Soviet Union.

    The newly developed U-2, nicknamed the Dragon Lady, appeared to offer the perfect vessel. The US had already used it to spy on the Soviet’s domestic nuclear program as its high-altitude capabilities – it was designed in the 1950s to reach “a staggering and unprecedented altitude of 70,000 feet,” in the words of its developer Lockheed – put it out of the range of antiaircraft missiles.

    Or so the US had thought. In 1960, the Soviets shot down a CIA-operated U-2 and put its pilot Gary Powers on trial. Washington was forced to abandon its cover story (that Powers had been on a weather reconnaissance mission and had drifted into Soviet airspace after blacking out from oxygen depletion), admit the spy plane program, and barter for Powers to be returned in a prisoner swap.

    “Since America didn’t want to have its own pilots shot down in a U-2 the way Gary Powers had been over the Soviet Union in 1960, which caused a major diplomatic incident, they turned to Taiwan, and Taiwan was all too willing to allow its pilots to be trained and to do a long series of overflights over mainland China,” Chris Pocock, author of “50 Years of the U-2,” explained in the 2018 documentary film “Lost Black Cats 35th Squadron.”

    A mobile chase car pursues a U-2 Dragon Lady as it prepares to land at Beale Air Force Base in California in June 2015.

    Like the U-2, Taiwan – also known as the Republic of China (ROC) – seemed a perfect choice for the mission. The self-governing island to the east of the Chinese mainland was at odds with the Communist leadership in Beijing – as it remains today – and at that time in history had a mutual defense treaty with Washington.

    That treaty has long since lapsed, but Taiwan remains a point of major tensions between China and the United States, with Chinese leader Xi Jinping vowing to bring it under the Communist Party’s control and Washington still obligated to provide it with the means to defend itself.

    Today, the US sells F-16 fighter jets to Taiwan as part of that obligation. In the 1960s, Taiwan got the US-made U-2s.

    The island’s military set up a squadron that would officially be known as the “Weather Reconnaissance and Research Section.”

    But its members – pilots from Taiwan who had been trained in the US to fly U-2s – knew it by a different name: the “Black Cats.”

    The author Pocock and Gary Powers Jr., the son of the pilot shot down by the Soviets and the co-founder of the Cold War Museum in Washington, DC, explained the thinking behind the squadron and its mission in the 2018 documentary film.

    The other CIA unit in Taiwan

  • Coinciding with the Black Cat Squadron, the Black Bat Squadron was formed under the cooperation of the Central Intelligence Agency and Taiwan’s air force, according to a Taiwan Defense Ministry website.
  • While the Black Cats were in charge of high-altitude reconnaissance missions, the Black Bats conducted low-altitude reconnaissance and electronic intelligence gathering missions over mainland China from May 1956. It also operated in Vietnam in tandem with the US during the Vietnam War.
  • Between 1952 to 1972, the Black Bats lost 15 aircraft and 148 lives, according to the website.

“The Black Cats program was implemented because the American government needed to find out information over mainland China – what were their strengths and weaknesses, where were their military installations located, where were their submarine bases, what type of aircraft were they developing,” said Powers Jr.

Lloyd Leavitt, a retired US Air Force lieutenant general, described the mission as “a joint intelligence operation by the United States and the Republic of China.”

“American U-2s were painted with ROC insignia, ROC pilots were under the command of a ROC (Air Force) colonel, overflight missions were planned by Washington, and both countries were recipients of the intelligence gathered over the mainland,” Leavitt wrote in a 2010 personal history of the Cold War published by the Air Force Research Institute in Alabama.

One of the first men to fly the U-2 for Taiwan was Mike Hua, who was there when the first of the planes arrived at Taoyuan Air Base in Taiwan in early 1961.

“The cover story was that the ROC (air force) had purchased the aircraft, that bore the (Taiwanese) national insignia. … To avoid being confused with other air force organizations stationed in Taoyuan, the section became the 35th Squadron with the Black Cat as its insignia,” Hua wrote in a 2002 history of the unit for the magazine Air Force Historical Foundation.

At the Taiwan airbase, Americans worked with the Taiwan pilots, helping to maintain the aircraft and process the information. They were know as Detachment H, according to Hua.

“All US personnel were ostensibly employees of the Lockheed Aircraft Company,” Hua wrote.

The ROC air force and US representatives inked an agreement on the operation, giving it the code name “Razor,” Hua wrote.

He described the intelligence gained by the flights as “tremendous” and said it was shared between Taipei and Washington.

“The missions covered the vast interior of the Chinese mainland, where almost no aerial photographs had ever been taken,” he wrote. “Each mission brought back an aerial photographic map of roughly 100 miles wide by 2,000 miles long, which revealed not only the precise location of a target, but also the activities on the ground.”

Other sensors on the spy planes gathered information on Chinese radar capabilities and more, he said.

Between January 1962 and May 1974, according to a history on Taiwan’s Defense Ministry’s website, the Black Cats flew 220 reconnaissance missions covering “more than 10 million square kilometers over 30 provinces in the Chinese mainland.”

When asked for further comment on the Black Cats, the ministry referred CNN to the published materials.

“The idea was that black cats go out at night, and the U-2 would usually launch in the darkness. Their cameras were the eyes, and it was very stealthy, quiet, and hard to get. And so combining the two stories, they became known as the Black Cats,” the author Pocock said in the documentary.

The squadron even had its own patch, reputedly drawn by one of its members, Lt. Col. Chen Huai-sheng, and inspired by a local establishment frequented by the pilots.

But the Black Cats, like Powers Sr. two years before, were about to find out their U-2s were not impervious to antiaircraft fire.

On September 9, 1962, Chen became the first U-2 pilot to be shot down by a People’s Liberation Army antiaircraft missile. His plane went down while on a mission over Nanchang, China.

Sailors assigned to Explosive Ordnance Disposal Group 2 recover a high-altitude surveillance balloon off the coast of Myrtle Beach, South Carolina, Feb. 5, 2023. (U.S. Navy Photo by Mass Communication Specialist 1st Class Tyler Thompson)

See photos showing US Navy recovering spy balloon from water

In the following years, three more Black Cat U-2 pilots were killed on missions over China as the PLA figured out how to counter the U-2 missions.

“The mainland Chinese learned from their radars where these flights were going, what their targets were, and they began to build sites for the missiles but move them around,” Pocock said.

“So they would build a site here, occupy that site for a while but if they thought the next flight would be going over here, they would move the missiles. It was a cat-and-mouse game, literally a black cat and mouse game between the routines from the flights from Taiwan and those air defense troops of the (Chinese) mainland, working out where the next flight would go.”

In July 1964, Lt. Col. Lee Nan-ping’s U-2 was shot down by a PLA SA-2 missile over Chenghai, China. According to the Taiwan Defense Ministry he was flying out of a US naval air station in the Philippines and trying to gain information on China’s supply routes to North Vietnam.

In September 1967, a PLA missile hit the U-2 being flown by Capt. Hwang Rung-pei over Jiaxin, China, and in May 1969, Maj. Chang Hsieh suffered a “flight control failure” over the Yellow Sea while reconnoitering the coast of Hebei province, China. No trace of his U-2 was ever found, according to Taiwan’s Defense Ministry.

A U-2 Dragon Lady, from Beale Air Force Base, lands at Joint Base Pearl Harbor-Hickam, Hawaii, in 2017.

Two other Taiwanese U-2 pilots were shot down but survived, only to spend years in Communist captivity.

Maj. Robin Yeh was shot down in November 1963 over Jiujiang, Jiangxi province.

“The plane lost control when the explosion of the missile took out part of the left wing. The plane spiraled down. Lots of shrapnel flew into the plane and hit both of my legs,” Yeh, who died in 2016, recalled in “The Brave in the Upper Air: An Oral History of The Black Cat Squadron” published by Taiwan’s Defense Ministry.

He said that following his capture Chinese doctors removed 59 pieces of shrapnel from his legs, but couldn’t take it all out.

“It didn’t really affect my daily life, but during winter my legs would hurt, which affected my mobility. I guess this would be my lifelong memory,” Yeh said.

Maj. Jack Chang’s U-2 was hit by a missile over Inner Mongolia in 1965. He, too, suffered dozens of shrapnel injuries and bailed out, landing on a snowy landscape.

“It was dark at the time, preventing me from seeking help anyway, so I had to wrap myself up tightly with the parachute to keep myself warm … After ten hours when dawn broke, I saw a village of yurts afar, so I dragged myself and sought help there. I collapsed as soon as I reached a bed,” he recalled in the oral history.

Neither Yeh nor Chang, who were assumed killed in action, would see Taiwan again for decades. The pilots were eventually released in 1982 into Hong Kong, which at the time was still a British colony.

However, the world into which they emerged had changed greatly in the intervening years. The US no longer had a mutual defense treaty with Taiwan and had formally switched diplomatic recognition from Taipei to Beijing.

Though the Cold War US-Taiwan alliance was no longer, the CIA brought the two pilots to the US to live until they were finally allowed to return to Taiwan in 1990.

Members of the 5th Reconnaissance Squadron

Indeed, by the time of their release CIA control of the U-2 program had long since ceased. It had turned the planes over to the US Air Force in 1974, according to a US Air Force history.

Two years later, the Air Force’s 99th Strategic Reconnaissance Squadron and its U-2s moved into Osan Air Base in South Korea. Commander Lt. Col. David Young gave the location the “Black Cat” moniker.

Today, the unit is known as the 5th Reconnaissance Squadron.

But US U-2s continue to be involved in what might be characterized as “cat-and-mouse” activities and their activities continue to make waves occasionally in China. In 2020, Beijing accused the US of sending a U-2 into a no-fly zone to “trespass” on live-fire exercises being conducted by China below.

The US Pacific Air Forces confirmed to CNN at the time that the flight had taken place, but said it did not violate any rules.

Meanwhile, for those involved in the original Black Cats, there are few regrets – even for those who were captured.

Yeh told the documentary makers he had fond memories of life at 70,000 feet.

“We were literally up in the air. The view we had was also different; we had the bird’s eye view. Everything we saw was vast,” he said.

Chang too felt no bitterness.

“I love flying,” he said. “I didn’t die, so I have no regrets.”

[ad_2]

Source link

  • US intelligence community cannot link ‘Havana Syndrome’ cases to a foreign adversary | CNN Politics

    US intelligence community cannot link ‘Havana Syndrome’ cases to a foreign adversary | CNN Politics

    [ad_1]



    CNN
     — 

    The US intelligence community cannot link any cases of the mysterious ailment known as “Havana Syndrome” to a foreign adversary, ruling it unlikely that the unexplained illness was the result of a targeted campaign by an enemy of the US, according to a US intelligence assessment published on Wednesday.

    The latest conclusion comes years after the so-called syndrome first emerged and defies a theory that it could have been the result of a targeted campaign by an enemy of the US.

    The new assessment echoes an interim report from the CIA last year that found it unlikely that the “anomalous health incidents,” as they are formally known, were the caused by “a sustained worldwide campaign” by Russia or any other foreign actor.

    Wednesday’s assessment also goes further in finding that there is no credible evidence that a foreign adversary has a weapon or collection device that is capable of causing the mysterious incidents, US intelligence officials said.

    Officials also explained that the medical analysis has also evolved in a way that points away from adversarial involvement.

    “I can share with you that most IC agencies have now concluded that it is ‘very unlikely’ a foreign adversary is responsible for the reported AHIs. IC agencies have varying confidence levels because we still have gaps given the challenges collecting on foreign adversaries – as we do on many issues involving them,” said Director of National Intelligence Avril Haines.

    The mysterious illness first emerged in late 2016, when a cluster of diplomats stationed in the Cuban capital of Havana began reporting symptoms consistent with head trauma, including dizziness and extreme headaches. In subsequent years, there have been cases reported around the world, including clusters of at least 60 incidents in Bogota, Colombia and Vienna, Austria. There have been about 1,500 reported cases across the US government in 96 different counties including some cases reported this year, officials said Wednesday, but the number of reported incidents has dropped significantly in the last year.

    The assessment, the result of the work of seven intelligence agencies, draws on the immense resources of the US intelligence community, including a review of hundreds of incidents and a wide range of factors surrounding them, officials explained.

    Wednesday’s assessment, however, does not provide definitive answers on or what caused the ailment that has sickened hundreds of US government personnel and family members worldwide.

    There is no one explanation for these incidents. Instead, there are many different possible causes including environmental as well as social factors and preexisting medical conditions, officials said.

    The assessment is likely to lead to further frustration among those impacted who have chastised the US government for not taking the condition seriously enough or slow-rolling the investigation.

    “There is something counterintuitive to all of this. If doctors are diagnosing some of us with a qualified injury to the brain in the line of duty and we are not saying it was a foreign adversary, what was it from?” said one former CIA agency officer who experienced symptoms.

    The intelligence community workforce was notified of the assessment on Wednesday, officials said. Sufferers were notified in recent days that the assessment was coming and some received a call from CIA Director Bill Burns, one source said.

    In a statement, Burns said the assessment is “one of the largest and most intensive investigations in the Agency’s history,” stating that it “reflects more than two years of rigorous, painstaking collection, investigative work, and analysis by IC agencies, including CIA.”

    “I want to be absolutely clear: these findings do not call into question the experiences and real health issues that US Government personnel and their family members – including CIA’s own officers – have reported while serving our country,” he said.

    The investigative efforts were “extremely aggressive” and involved “a high degree of risk,” one official explained. Intelligence officers vigorously studied what happened in the hours, days and weeks surrounding the incidents, the official explained.

    In some instances they found malfunctioning HVAC systems, which can cause discomfort to humans, and in other cases there were computer mice that created surprising disruptions.

    “We weren’t finding what we expected to find,” said one of the US officials. “There is no one explanation for any of this.”

    There was also criminal activity that occurred around some of the incidents – such as the presence of weapons dealers. But when intelligence officials chased those leads – by looking into the criminals’ past, their family and their travels – they found no connection to the mysterious health incidents.

    Officials even considered extraterrestrials as a cause, but found no linkage, they said.

    Officials said that evidence pointed against foreign involvement, including citing “confusion” on the topic among key adversaries.

    On the whole, officials did not find evidence to validate one of their incoming assumptions that one or more state actor was causing the incidents, they explained.

    There is nothing to indicate that these incidents were the result of an insider attack, the officials said. The officials would not discuss if the US has a weapon that could have caused these incidents.

    The findings also follow a report from a panel of experts last year – including scientists inside and outside of government – that found that “pulsed electromagnetic energy” emitted by an external source could have “plausibly” caused the mysterious incidents. While the latest intelligence assessment doesn’t count out that possibility completely, it appears to cast doubt on it by concluding that no US adversary has the plausible weapon or mechanism that would be needed for that to happen.

    US officials said that one of the lessons learned from the investigation was that the US government needs to do a better job looking after the health and safety of the workforce.

    Over the last year, the CIA and the State Department began providing compensation to victims whose symptoms required at least a year of medical assistance. Compensation efforts are “separate and distinct” from the intelligence assessment and will continue to be implemented, officials said.

    Following the release of the assessment, administration officials were clear that support would continue.

    “We are going to continue to see to it that our colleagues who report these incidents are treated with respect and compassion, receive timely access to medical care and we’ll continue to process Havana Act payments based on the eligibility criteria that’s been spelled out in the law,” State Department spokesperson Ned Price said.

    However, the future of the US government’s probe into these incidents is a bit murky.

    Officials would not definitively say if the intelligence community’s task force devoted to this effort would stay up and running, but Haines said that the work “will and must endure.” The Pentagon also has a team of experts that continues to investigate the matter.

    This story has been updated with additional information.

    [ad_2]

    Source link

  • US Energy Department assesses Covid-19 likely resulted from lab leak, furthering US intel divide over virus origin | CNN Politics

    US Energy Department assesses Covid-19 likely resulted from lab leak, furthering US intel divide over virus origin | CNN Politics

    [ad_1]



    CNN
     — 

    The US Department of Energy has assessed that the Covid-19 pandemic most likely came from a laboratory leak in China, according to a newly updated classified intelligence report.

    Two sources said that the Department of Energy assessed in the intelligence report that it had “low confidence” the Covid-19 virus accidentally escaped from a lab in Wuhan.

    Intelligence agencies can make assessments with either low, medium or high confidence. A low confidence assessment generally means that the information obtained is not reliable enough or too fragmented to make a more definitive analytic judgment or that there is not enough information available to draw a more robust conclusion.

    The latest assessment further adds to the divide in the US government over whether the Covid-19 pandemic began in China in 2019 as the result of a lab leak or whether it emerged naturally. The various intelligence agencies have been split on the matter for years. In 2021, the intelligence community declassified a report that showed four agencies in the intelligence community had assessed with low confidence that the virus likely jumped from animals to humans naturally in the wild, while one assessed with moderate confidence that the pandemic was the result of a laboratory accident.

    Three other intelligence community elements were unable to coalesce around either explanation without additional information, the report said.

    The Wall Street Journal first reported on the new assessment from the Department of Energy. A senior US intelligence official told the Journal that the update to the intelligence assessment was conducted in light of new intelligence, further study of academic literature and in consultation with experts outside government.

    A Department of Energy spokesperson told CNN in a statement: “The Department of Energy continues to support the thorough, careful, and objective work of our intelligence professionals in investigating the origins of COVID-19, as the President directed.”

    The Department of Energy’s Office of Intelligence and Counterintelligence is one of 18 government agencies that make up the intelligence community, which are under the umbrella of the Office of the Director of National Intelligence.

    The Office of the Director of National Intelligence declined to comment.

    The latest intelligence assessment was provided to Congress as Republicans on Capitol Hill have been pushing for further investigation into the lab leak theory, while accusing the Biden administration of playing down its possibility.

    A spokesperson for House Oversight Chairman James Comer, a Kentucky Republican, said in a statement that the committee was “reviewing the classified information provided” by the Office of the Director of National Intelligence in response to a letter requesting information earlier this month.

    One of the sources said that the new assessment from the Department of Energy is similar to information from a House Republican Intelligence Committee report released last year on the origins of the virus.

    National security adviser Jake Sullivan said on CNN’s “State of the Union” on Sunday that the intelligence community remains divided on the matter, while noting that President Joe Biden has put resources into getting to the bottom of the origin question.

    “Right now, there is not a definitive answer that has emerged from the intelligence community on this question,” Sullivan told CNN’s Dana Bash. “Some elements of the intelligence community have reached conclusions on one side, some on the other. A number of them have said they just don’t have enough information to be sure.”

    Sullivan said Biden had directed the national laboratories, which are part of the Department of Energy, to be brought into the assessment.

    In May 2020, researchers at the government-backed Lawrence Livermore National Laboratory issued a classified report that found it was possible that the coronavirus escaped from a lab in Wuhan, which came at a time when that line of inquiry was considered taboo.

    The US began exploring the possibility that Covid-19 spread in a laboratory as early as April 2020, though the intelligence community has noted repeatedly that a lack of cooperation from Beijing has made it difficult to get to the bottom of the question.

    [ad_2]

    Source link

  • US intel agencies likely missed chances to investigate Covid pandemic’s origin, House Democrats’ report says | CNN Politics

    US intel agencies likely missed chances to investigate Covid pandemic’s origin, House Democrats’ report says | CNN Politics

    [ad_1]


    Washington
    CNN
     — 

    Democratic investigators on the House Intelligence Committee have alleged that US intelligence agencies may have lost a critical opportunity to gather useful information on the Covid-19 pandemic’s origins by failing to pivot its collection resources earlier. In a report released on Thursday morning, the Democrats also laid out perhaps the most detailed timeline to date of the litany of warnings the intelligence community offered the Trump administration in the early days of the pandemic.

    The Democratic report comes just 24 hours after committee Republicans released their own report on the intelligence community’s examination of the pandemic’s origins in what has become an indirect battle for the narrative surrounding the Covid-19 pandemic just weeks before Republicans are poised to claim control of the House.

    The Democratic investigators’ report says that the intelligence community was slow to pivot its clandestine resources to the growing crisis – in ways that have likely undermined its efforts to understand how or where the virus emerged.

    “It’s a hypothetical – no one could say with certainty, yes or no,” said one committee investigator. “But hypothetically speaking, if you have more information from clandestine sources from the very earliest days of the virus – perhaps before Chinese authorities entirely know what’s going on – you may be better positioned to answer some of those questions [about the virus’s origins] that are I think still open questions.”

    Investigators declined to offer specifics about what resources should have been trained on the problem. But according to the report, “the first valuable piece of clandestine collection on the virus” was disseminated only in late January 2020. Analysts from the Defense Intelligence Agency unit that provided the intelligence community’s first warning of the pandemic told the House committee that by then, they had grown “frustrated at the lack of clandestine collection to inform their analysis.”

    “The lack of clandestine collection was a reflection of the Intelligence Community’s overall lack of preparedness to face an emerging pandemic,” the report found. “The first significant dissemination of intelligence this late in the development of the crisis demonstrates how the IC was underserving expert policymakers and analysts.”

    According to the Democrats’ report, the first warning the intelligence community offered to the Trump administration came from a little-known Defense Intelligence Agency unit in Fort Detrick, Maryland, which on December 31, 2019, published an open-source warning of an undiagnosed pneumonia in China, labeling it a “possible pandemic warning update.”

    By the end of January, the Office of the National Director of Intelligence had issued a memo directing the intelligence community to direct more resources at gathering information on the burgeoning crisis, calling it “the top intelligence concern in East Asia,” and warnings began to ripple out through the senior levels of government.

    On January 24, the same DIA unit warned that there was a “roughly even” chance of a global pandemic. President Donald Trump received what Democratic investigators believe was likely his first formal Presidential Daily Briefing on the virus the day before, and another on January 28.

    According to a witness who spoke to the committee about the January 28 PDB briefing, deputy national security adviser Matt Pottinger “was ‘losing it’ when talking about the disease’s severity and trying to convince the President and those assembled that ‘this will be a really big thing.’”

    The chairman of the Joint Chiefs of Staff received a warning about the virus in an intelligence briefing on January 29, 2020, and the next day, the CIA began to produce what are known as “executive updates” on the virus – “shorter intelligence products that demonstrate the CIA’s taking a potential crisis serious,” according to the report.

    Still, Democratic investigators allege, despite the drumbeat of warnings from the IC, “White House messaging” failed to effectively inform the public of the risk from the virus. Trump’s rhetoric diverged “striking[ly]” from the intelligence communities late January conclusions, they said, demonstrating “an executive branch that was informed, but failed to warn the American people.”

    The report notes that on January 30 – two days after the January 28 briefing in which Pottinger was allegedly “losing it” – Trump told an audience in Michigan that, “We think we have it very well under control.”

    CNN has reached out to the Trump campaign. The Office of the Director of National Intelligence declined to comment on the reports.

    “There has been a lot of focus on the first warning to the President on January 28,” the committee investigator said. “There has been much less focus on the rhythm of warnings following that, and what we what we find with a pretty consistent rhythm of warnings starting in late January and then really dialing up the volume throughout February.”

    The committee did not receive access to the original PDBs given to Trump but based its conclusions on draft materials and interviews with different intelligence agencies who contributed to the final product, according to investigators.

    By February, according to the report, PDB staff “pivoted from ‘warning’ of the emerging virus to assessing what the virus would mean for the world as it continued to spread.” The report goes on to list reporting from the State Department and the Department of Health and Human Services throughout the month, as well as what appears to be two additional warnings provided on February 11 and February 13 that are completely redacted.

    “For six weeks, the President’s message – that the virus was not a significant threat – was flatly inconsistent with what the Intelligence Community was reporting,” the report found.

    On March 11, the World Health Organization declared the coronavirus outbreak a pandemic.

    Committee Democrats say that despite some improvements, the intelligence community remains unprepared for the next pandemic. In a series of recommendations, the report calls for the intelligence community to develop the ability to pivot collection faster, better coordinate with health security agencies like the Centers for Disease Control and Prevention, and leverage open-source data more aggressively.

    Although House Republicans have made clear that investigations of the government’s handling of the pandemic – including the investigation into its origins – are a key target next year, it’s not clear how aggressively the Intelligence Committee specifically will move to pursue the issue when Republican Rep. Mike Turner of Ohio takes the chairman’s gavel. Notably, the GOP report was authored by Rep. Brad Wenstrup, who will not be on the committee next year unless he receives a waiver from the incoming House speaker to serve.

    Republicans in their report, released on Wednesday night, are accusing the intelligence community of “downplay[ing] the possibility” that SARS-CoV-2, the virus that causes Covid-19, “was connected to China’s bioweapons program” – an assertion that directly challenges the intelligence community’s own declassified report, released earlier this year, that said that there was “broad agreement” that the virus was not developed as a biological weapon. The GOP report provides no details to back up its claims, citing classification concerns. CNN is unable to verify the GOP report’s claims.

    The Republican’s report also alleges that the classified version of the intelligence community’s report on the pandemic’s origins “omits additional vital information and dismisses important intelligence in a cursory manner.”

    “Although our unclassified summary cannot reveal details, we can state that the classified Updated Assessment claimed the IC lacked information regarding one key classified issue,” the report states. “However, the Committee otherwise found that very information in other intelligence reporting, and this information is particularly relevant to determining SARS-CoV-2’s potential links to China’s bioweapons program.”

    Wenstrup in a call with reporters on Thursday said that while “I can’t reveal it now because there’s a classification status… what we’re wanting to do is let America know that we have found some discrepancy between the two reports.”

    Panel Republicans also allege that the intelligence community’s unclassified report “likely skewed the public’s understanding” of the question of whether SARS-CoV-2 was created as part of a bioweapons program because it did not disclose the technical “confidence level” that it had in that assessment, as it did with some other assessments.

    When pressed by CNN to detail the discrepancies between the classified and unclassified versions of the report, Republican staff investigators noted that the classified version included the confidence level for the bioweapons assessment and suggested that this was part of why they were “making a big deal of it,” but declined to go into further detail.

    The intelligence community’s declassified report said that it has not reached a conclusion on the origins of Covid-19, instead confirming that officials were split about whether the virus originated naturally or escaped from a lab.

    The GOP report also claims, without evidence, that the unclassified report “omitted other key information that was in the classified version in a manner that likely skewed the public’s understanding of key issues” and stonewalled efforts by Congress to provide further oversight over the government’s investigation and its findings.

    Turner, in an interview with CNN earlier this week, also declined to offer any specifics about how he felt that the unclassified report did not accurately represent information in the classified record.

    “I personally do not believe that the unclassified version adequately reflects the assertions or conclusions in the classified version,” Turner said. “That discrepancy is one of great interest to us.”

    Wenstrup in the report and his remarks to reporters said that Republicans will move to subpoena the intelligence community for more information if officials do not testify voluntarily.

    “We’re not vindictive in our approach,” Wenstrup said. “We just want to get to the truth.”

    [ad_2]

    Source link

  • Chinese hacking group targeting US agencies and companies has surged its activity, analysis finds | CNN Politics

    Chinese hacking group targeting US agencies and companies has surged its activity, analysis finds | CNN Politics

    [ad_1]


    Washington
    CNN
     — 

    An elite Chinese hacking group with ties to operatives indicted by a US grand jury in 2020 has surged its activity this year, targeting sensitive data held by companies and government agencies in the US and dozens of other countries, according to an expert at consulting giant PricewaterhouseCoopers.

    The findings highlight the biggest cyber-espionage challenge facing the Biden administration: combating a Chinese hacking program that the FBI has called more prolific than that of all other governments in the world combined.

    The Justice Department has aggressively sought to expose the alleged data-stealing campaigns through indictments, and made the case that Chinese hackers have robbed American companies of intellectual property, causing huge losses. But China-based hackers have often developed new tools or otherwise altered their operations, according to analysts.

    One of the Chinese groups tracked by PwC has targeted dozens of US organizations in the last year, including government agencies and software or tech firms, said Kris McConkey, who leads PwC’s global cyber threat intelligence practice. The intruders often comb networks for data that could offer insights into foreign or trade policy, he said, but also dabble in cryptocurrency schemes for personal profit. He declined to detail what types of US government agencies, whether at the federal, state or local level, were targeted.

    “They are, by far, the most active and globally impactful [hacking group] that we track at the minute,” McConkey, who closely follows China-based hackers, told CNN. He believes the attackers have been successful in breaching at least some organizations because they operate on a vast scale, targeting organizations in at least 35 countries this year alone.

    McConkey traced part of the activity to an ostensibly legitimate cybersecurity company based in the Chinese city of Chengdu, but he stopped short of publicly connecting the hacking to the Chinese government. US officials have for years accused China of using front companies to conduct hacking that feeds the government’s sprawling intelligence collection efforts.

    China has repeatedly denied allegations of hacking and Beijing has in recent months stepped up its own accusations that Washington has conducted cyber operations against Chinese assets.

    Cybersecurity issues have been a repeated source of friction between the world’s two biggest economies; President Joe Biden raised the subject on a call with Chinese President Xi Jinping last year.

    McConkey was one of multiple private cyber specialists who exposed the operations, and sometimes the alleged locations, of hackers from China, Iran and elsewhere at a recent conference called LABScon, hosted by US security firm SentinelOne, in Scottsdale, Arizona.

    Adam Kozy, who tracked Chinese hackers at the FBI from 2011 to 2013, showed the audience a photo of a People’s Liberation Army building in the city of Fuzhou that allegedly houses officers who conduct information operations against Chinese adversaries. That unit has targeted Taiwan, Kozy said, and “is the main area for China’s disinformation operations.”

    In their investigations of foreign hackers, the FBI and Justice Department prosecutors have drawn on those types of revelations from private researchers.

    At least one FBI agent and officials from the National Security Agency and the US Cybersecurity and Infrastructure Security Agency attended the conference, a reminder of how reliant government officials are on data held by tech firms to pursue spies and cybercriminals. Sometimes that work happens not in a classified facility but in the halls of a luxury hotel.

    Morgan Adamski, a senior NSA official, told conference attendees that the coronavirus pandemic changed how her agency worked with private firms to guard sensitive data targeted by hackers.

    “The pandemic actually helped because it no longer revolved around big government meetings in a room, in a SCIF [Sensitive Compartmentalized Information Facility], where you couldn’t use any of the information,” said Adamski, who heads the NSA’s Cybersecurity Collaboration Center, which works with defense contractors to blunt the impact of foreign hacking.

    After US defense contractors began working from home during the pandemic, she said, Chinese government hackers exploited the virtual private networking (VPN) software the contractors were using. One hacked contractor, which she didn’t name, shared data with federal agencies so they could build a clearer picture of what was going on.

    Asked by CNN whether the NSA and other federal agencies responding to the hacks were able to evict the Chinese hackers, Adamski said it’s an iterative process.

    “When you talk about nation-state actors, you kick them out, but they’re going to come back,” Adamski said, “especially if you’re a defense industrial base company that is producing critical military intelligence for the Department of Defense.”

    [ad_2]

    Source link

  • Biden picks Air Force general to lead NSA and Cyber Command | CNN Politics

    Biden picks Air Force general to lead NSA and Cyber Command | CNN Politics

    [ad_1]



    CNN
     — 

    President Joe Biden has nominated an Air Force general to head the nation’s powerful electronic spying agency and the US military command that conducts offensive cyber operations – a crucial position as the US continues to battle Russia, China and other foes in cyberspace.

    Lt. Gen. Timothy Haugh, who has served for years in senior US military cyber positions, is Biden’s choice to replace outgoing Army Gen. Paul Nakasone as head of the National Security Agency and US Cyber Command, an Air Force official confirmed to CNN.

    Politico first reported on Haugh’s nomination.

    The White House did not respond to a request for comment.

    Haugh’s nomination could face a roadblock in the Senate after Republican Sen. Tommy Tuberville of Alabama put a hold on senior military nominations because he objects to the department’s abortion travel policy.

    Haugh is currently deputy of US Cyber Command, a command of thousands of US military personnel who conduct offensive and defensive cyber operations to protect US critical infrastructure. Officials from the command traveled to Ukraine in late 2021 to prepare Kyiv for an onslaught of Russian cyberattacks that accompanied the full-scale Russian invasion.

    The command and NSA also have taken an increasingly active role in helping defend American elections from foreign interference under Nakasone’s leadership over the last five years.

    During the 2020 election, Iranian hackers accessed a US municipal website for reporting unofficial election results and Cyber Command kicked the hackers off the network out of concern that they might post fake results on the website, a senior US military official revealed last month.

    Haugh’s nomination signals a continued emphasis on election security work at Fort Meade, the sprawling military base in Maryland where the NSA and Cyber Command are housed. As a senior US military cyber official, Haugh has been involved in election security discussions in recent midterm and general elections.

    [ad_2]

    Source link

  • CIA director visited China last month as US seeks to reset relations | CNN Politics

    CIA director visited China last month as US seeks to reset relations | CNN Politics

    [ad_1]



    CNN
     — 

    CIA Director Bill Burns secretly traveled to China last month, a US official told CNN Friday, amid efforts by the United States to reset relations with Beijing after a year of extremely heightened tensions.

    According to the US official, Burns “met with Chinese counterparts and emphasized the importance of maintaining open lines of communication in intelligence channels.”

    Another US official explained that the trip was was an intelligence to intelligence engagement, not a diplomatic mission.

    But Burns’ visit comes as the US has repeatedly signaled that Washington is seeking to diminish tensions with Beijing, particularly after the spy balloon incident earlier this year, which inflamed the bilateral relationship and caused Secretary of State Antony Blinken to postpone a planned trip to China.

    Burns’ trip, which was first reported by the Financial Times, is the highest-level visit by a US official to date, and comes as the Biden administration has sought to resume cabinet-level engagement with Chinese officials, to varying degrees of success.

    The specific intelligence matter that Burns discussed in Beijing is unclear.

    US officials – including Burns – have been warning for months that US intelligence indicated Chinese leadership was considering provide lethal support to Ukraine, but so far Beijing has not moved ahead with that support.

    US officials have also warned about a possible Chinese effort to takeover Taiwan.

    “Our assessment at CIA is that I wouldn’t underestimate President Xi’s ambitions with regard to Taiwan,” Burns said earlier this year.

    On Friday, US Secretary of Defense Lloyd Austin and his Chinese counterpart Li Shangfu “spoke briefly” in Singapore, a Pentagon spokesperson said, after Beijing rebuffed a US request for a formal meeting between the two officials.

    “Secretary Austin and PRC Minister of National Defense Li Shangfu spoke briefly at tonight’s opening dinner of the Shangri-La Dialogue in Singapore. The two leaders shook hands, but did not have a substantive exchange,” Pentagon Press Secretary Brig. Gen. Pat Ryder said in a statement.

    “The Department believes in maintaining open lines of military-to-military communication with the PRC — and will continue to seek meaningful military-to-military discussions at multiple levels to responsibly manage the relationship,” the statement said.

    Other than the brief encounter, Austin had not spoken with his counterpart, who is under US sanction, in months despite other requests. Earlier this year, China refused to take a call after the US shot down a suspected Chinese surveillance balloon that had traversed across the country.

    China’s Defense Ministry blamed the US in a statement this week about the deteriorating communication, saying that responsibilities “for the current difficulties faced by the two militaries in their exchanges lies entirely with the US side.”

    “The US claims that it wants to strengthen communication, but in reality it disregards China’s concerns and creates artificial obstacles, seriously undermining mutual trust between the two militaries,” said ministry spokesperson Tan Kefei.

    The break in communication has extended past the most senior levels of the two countries’ militaries. Adm. John Aquilino, commander of the US Indo-Pacific Command, told lawmakers in April that Chinese officials have also declined to accept a standing invitation to meet with the eastern and southern theater commanders of the People’s Liberation Army.

    Asked in Japan on Thursday about China’s turning down the meeting request, Austin warned that the ongoing lack of communication could result an “incident that could very, very quickly spiral out of control.”

    Other US officials, however, have had engagements with Chinese officials in recent weeks. National security adviser Jake Sullivan met with top Chinese official Wang Yi in Vienna for “candid” and “constructive” talks in mid-May.

    A US senior administration official said the meeting was an attempt to put communications back on track after the spy balloon incident.

    “I think both sides recognized that that unfortunate incident led to a bit of a pause in engagement. We’re seeking now to move beyond that and reestablish just a standard normal channel of communications,” the official said on a call with reporters after the meeting.

    “We made clear where we stand in terms of the breach of sovereignty, we’ve been clear on that from the very get-go. But again, trying to look forward from here on,” the official added, noting they focused on “how do we manage the other issues that are ongoing right now and manage the tension in the relationship that exists.”

    US Commerce Secretary Gina Raimondo and US Trade Representative Katherine Tai both met with Chinese Commerce Minister Wang Wentao last week.

    “I had a productive meeting Thursday of last week in person with Minister Wang, the commerce secretary, who came to D.C. And it was a candid, direct, productive exchange where we tackled head on some of our issues related to economic coercion and other irritants, but also where we agreed to keep the channel of communication open in the hope that increased dialogue would lead to de-escalation of tension and an ability to solve problems,” Raimondo said at a press availability in Sweden earlier this week.

    [ad_2]

    Source link

  • Biden elevates CIA director to Cabinet, a symbolic nod to central role | CNN Politics

    Biden elevates CIA director to Cabinet, a symbolic nod to central role | CNN Politics

    [ad_1]



    CNN
     — 

    President Joe Biden is elevating CIA Director Bill Burns to his Cabinet, a symbolic measure that nonetheless represents the major role he has played in national security amid Russia’s invasion of Ukraine.

    “Under his leadership, the CIA is delivering a clear-eyed, long-term approach to our nation’s top national security challenges – from tackling Russia’s brutal aggression against Ukraine, to managing responsible competition with the People’s Republic of China, to addressing the opportunities and risks of emerging technology,” Biden wrote in a statement.

    “Bill has always given me clear, straightforward analysis that prioritizes the safety and security of the American people, reflecting the integral role the CIA plays in our national security decision-making at this critical time,” he said.

    The CIA has been central in the administration’s strategy toward Russia during the invasion of Ukraine, including downgrading and releasing intelligence surrounding the invasion in the leadup to the conflict last year.

    Burns has traveled to Ukraine and Moscow, along with other nations, as part of the administration’s approach to the war.

    The role of CIA director has been in and out of presidential cabinets over the past several years. Former President Donald Trump’s CIA directors – Mike Pompeo and Gina Haspel – were Cabinet-level posts, but Biden chose not to include the post in his Cabinet when taking office.

    “The President’s announcement today recognizes the essential contributions to national security the Central Intelligence Agency makes every day, and reflects his confidence in our work,” Burns said in a statement. “I am honored to serve in this role, representing the tremendous work of our intelligence officers. It is also an honor to serve alongside our exceptional intelligence community colleagues, under the leadership of DNI Avril Haines.”

    [ad_2]

    Source link

  • Former Director of National Intelligence John Ratcliffe testifies to grand jury in January 6 probe | CNN Politics

    Former Director of National Intelligence John Ratcliffe testifies to grand jury in January 6 probe | CNN Politics

    [ad_1]



    CNN
     — 

    Former Director of National Intelligence John Ratcliffe testified before a federal grand jury Thursday in Washington, DC, as part of the special counsel’s criminal probe into the aftermath of the 2020 election.

    Former President Donald Trump had sought to block testimony from Ratcliffe and other top officials from his administration, but courts have rejected his executive privilege claims.

    The investigation led by special counsel Jack Smith has focused on January 6, 2021, and other efforts to overturn the presidential election.

    Ratcliffe is likely of interest to investigators because he personally told Trump and his allies that there was no evidence of foreign election interference or widespread fraud.

    [ad_2]

    Source link