Thursday, December 17, 2020

Fang Fang Bang Bang: Not Just For Hunter Biden Any More...,

nypost |  As we try to come to terms with the extent of Chinese influence over the Biden family, a leaked database of registered members of the Chinese Communist Party has exposed a mass infiltration of American companies — with serious national security implications. 

Boeing, Qualcomm and Pfizer are just three US companies that have employed dozens of CCP members in their Chinese facilities, the database reveals. 

As well, three female employees of the US consulate in Shanghai have been identified in the list of 1.95 million party members that was leaked to an international group of legislators, the Inter-Parliamentary Alliance on China, which includes Sens. Marco Rubio (R-Fla.) and Bob Menendez (D-NJ). 

All CCP members swear an oath to “fight for communism throughout my life, be ready at all times to sacrifice my all for the party and the people, and never betray the party [and] guard party secrets, be loyal to the party.” 

Sen. Josh Hawley (R-Mo.), a member of the Homeland Security Committee, said yesterday: “CCP agents have no place in US government facilities, and this report should serve as a much-needed wake-up call to Washington, DC, and corporate executives, who continue to welcome the Chinese government with open arms. 

“[It] is just more evidence of the extent to which the CCP has successfully infiltrated American companies and government.” 

While none of the people listed in the database have been identified as spies, mounting concerns in the State Department about the CCP have resulted in tightened visa rules for its members earlier this month. CCP members and their immediate families now are limited to one-month, single-entry US permits. 

The database was verified by international cybersecurity firm Internet 2.0, which found it was originally leaked on encrypted messaging app Telegram in 2016. It was passed on to IPAC six weeks ago by a third party. 

“We have high confidence this list is authentic,” Internet 2.0 co-founder David Robinson, a former Australian army intelligence officer, told me Sunday. 

“Someone — an insider, a dissident — managed to get physical access to the server [in Shanghai] from outside the building. They didn’t have to hack it over the internet.” 

Each data entry contains the CCP member’s name, ethnicity, place of birth, education level, identification number and, in some cases, a phone number and address.  Fist tap Dale

0 comments:

The Weaponization Of Safety As A Way To Criminalize Students

 Slate  |   What do you mean by the “weaponization of safety”? The language is about wanting to make Jewish students feel saf...