Monday, July 11, 2016

China is a criminal syndicate this is a small list of its criminal activity

China operates as a police state and a massive criminal syndicate with connections around the world.  This is a short list of some of the criminal activities it is engaged in and links to the evidence.


Hacking and Espionage
Chinese hackers stole U.S. Steel's trade secrets http://n.pr/21hXKCJ
Chinese cyberattacks US technology and pharmaceuticals companies http://ow.ly/TNbpX
Impact of OPM breach could last more than 40 years http://fdscp.com/29A71Dy
China building massive database on Americans http://washex.am/1VZ9GWt 
China's agents in US trying to steal jet engines http://cnnmon.ie/1PjQ0sN 

Drug Dealing and Money Laundering
China feeds fentanyl, a deadly synthetic opioid, to the U.S. http://on.wsj.com/28Q4Ais
Chinese gangs behind Philippine illegal drug trade https://shar.es/1JAGl8
UN: China synthetic drugs trade 'out of control' http://aje.io/p9uj
China becoming money laundering haven for drug cartels http://fxn.ws/1UwKlXi 
Money-Laundering Investigation Stymied by China, Italy Says http://nbcnews.to/1AO57cs
 
Fraud and Corruption
After China fraud boom, Nasdaq steps up scrutiny of shady listings http://on.mktw.net/28KpSv7
China has the worst corporate transparency levels http://cnb.cx/29C0GZ5
Chinese accounting is ‘highly questionable’ as in fraudulent http://cnb.cx/1pco0AN

Criminal Goods and Services
China's fake goods bad parts, bad food, bad medicine https://t.co/xX0NTJpmwe
China's Cyber-Crime Economy Grows in Size, Sophistication http://fw.to/yJY8kAY
China essentially controls underworld currency bitcoin http://nyti.ms/294jnBA

Sabotage and Strong Arm Robbery
China using civilian ships to spy on, sabotage & intimidate its neighbors bit.ly/Intelnsult 
China accused of Poisoning Disputed South China Sea Fish http://bit.ly/1VM2iS7
China illegally cordoned off a huge part of the South China Sea http://qz.com/728289

Kidnapping Stalking and Mass Murder
Hong Kong’s bookseller is stalked and terrorized in his home city http://qz.com/724159
China's Organ Harvest 'Nazi-like'  Organ Harvest


Tuesday, June 7, 2016

Feds' personal info not any safer, but low interest in protecting it

 Most of the people effected by the OPM hack have not signed up for identity protection.  I have signed up for the protection thou I am confident that steeling people's ID's is not the way China is using the data.



Feds' personal info not any safer, but low interest in protecting it

Wednesday, September 23, 2015

Ashley, Jared, OPM and Blackmail

Ashley, Jared and OPM how many people have data that can be used to blackmail them?  The answer is probably a lot higher then we would like to think.  From marriage infidelities to criminal activities online there is a significant amount of material that could cost someone their job or their marriage or even as with Jared their freedom.  This allows those people to be extorted by criminals and eventually leaves them open to blackmail by any police state with a sophisticated monitoring system.

Communist China has that monitoring capability and a massive data base that allows them to make connections between any number of people.  It is therefore in a position to covertly manipulate people and get them to act in a way that is advantages for their police state.   From getting factories sent to their country to preventing sanctions for their hacking any number of decisions can be manipulated to China's advantage with almost no way of detecting their influence.

The combination of a blackmail database with total monitoring capabilities on smart phones is a disaster.  http://www.theepochtimes.com/n3/1471152-china-is-building-a-database-on-americans-using-its-domestic-spy-program/

http://www.v3.co.uk/v3-uk/news/2427186/chinese-firm-attacks-android-phones-via-malware-laced-apps


Communist China is engaged in Hybrid warfare against US

This article from the diplomat discusses the Communists China's use of hybrid warfare against the United States.  http://thediplomat.com/2015/09/hybrid-warfare-with-chinese-characteristics/

The basic concept is to use all possible methods to attack your enemies.  This would include cyber attacks as well economic warfare to undermine the enemies capability to resist.  Using criminals and terrorists as proxy's to physically attack the enemy with no cost to the aggressor.  Most importantly it has a large amount of psychological warfare to destroy the targets will to resist.

Communist China refers to this type of conflict as unrestricted warfare and two Colonels from the PLA wrote an extensive paper on it titled Unrestricted Warfare that mentions Osama Bin Ladin and the world trade center. 

"whether it be intrusions of hackers, a major explosion at the World Trade Center, or a bombing attack by bin Laden, all of these greatly exceed the frequency bandwidth understood by the American military... This is because they have never taken into consideration and have even refused to consider means that are contrary to tradition and to select measures of operation other than military means"
 

Tuesday, September 1, 2015

Stop fluffy bunny

Rocket kitten continues to attack individuals in Israel and Europe and it even uses their home systems to launch attacks on the corporate networks.  Which means the bad guys have a lot of information about everyone and you are not safe anywhere. 

The second issue is we have to stop giving these groups cute names like kitten and Panda.  These are police state controlled organizations.  There actions,  hacking into our infrastructure and stealing intellectual  property, threaten our lives and livelihoods.  Fluffy bunny type names do not reflect the massive threat their hacking is to us.  They could take down our power grid just like a nookie wookie could.

http://www.scmagazine.com/trend-micro-publishes-new-state-sponsored-report/article/436033/

"The Advanced Persistent Threat (APT) campaign also had its perpetrators targeting personal accounts, versus corporate ones, which allows them to seamlessly move from a less secure home network to an individual's corporate accounts and network."

Wednesday, August 26, 2015

Chinese hacker group hammers Indian networks

Chinese hacker group hammers Indian networks 

and target journalists as well.  From the article.



"Reporters targeted by APT30 wrote on a small set of issues that FireEye
identified. They included the Chinese economy; corruption and human
rights issues in China;" etc