Darlene McCormick Sanchez, The Epoch Times – Genesis Wealth Defense https://genesiswealthdefense.com There's a thin line between ringing alarm bells and fearmongering. Fri, 20 Sep 2024 13:21:39 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://genesiswealthdefense.com/wp-content/uploads/2024/09/cropped-Money-32x32.jpg Darlene McCormick Sanchez, The Epoch Times – Genesis Wealth Defense https://genesiswealthdefense.com 32 32 237551656 Congressional Probe Into Democrat Fundraising Platform, ActBlue, Finds Potential “Criminal Activity” https://genesiswealthdefense.com/congressional-probe-into-democrat-fundraising-platform-actblue-finds-potential-criminal-activity/ https://genesiswealthdefense.com/congressional-probe-into-democrat-fundraising-platform-actblue-finds-potential-criminal-activity/#respond Fri, 20 Sep 2024 13:21:39 +0000 https://genesiswealthdefense.com/congressional-probe-into-democrat-fundraising-platform-actblue-finds-potential-criminal-activity/ (The Epoch Times)—A congressional investigation analyzing more than 200 million political contributions found potential “criminal activity” and referred the information to five state attorneys general for further review.

The review involved donation reports from ActBlue, an online Democratic fundraising platform, to the Federal Election Commission, according to Rep. Bryan Steil (R-Wis.), chairman of the House Administration Committee.

“This investigation focused on potential unlawful exploitation of unwitting ‘straw donors,’ whose identities may have been used to channel illicit funds into campaigns in your state,” Steil wrote in a Sept. 18 letter to the attorneys general.

Steil sent letters and information collected over the past year to Texas, Virginia, Arkansas, Florida, and Missouri for further investigation into ActBlue.

“The final analysis produced a set of anomalous donor profiles, ranked by the severity of the inconsistencies. In reviewing this analysis, it became clear there is suspicious activity occurring that warrants further review,” the letter stated.

ActBlue did not require a card verification value (CVV), according to Steil, which made it vulnerable to foreign and illegal contributions.

ActBlue did not immediately respond to a request for comment from The Epoch Times.

The platform has denied any wrongdoing.

“This investigation is nothing more than a partisan political attack and scare tactic to undermine the power of Democratic and progressive small-dollar donors,” the organization said in a statement on Aug. 2 as Virginia announced it was opening an investigation.

Republicans have resorted to “political attacks and spreading false accusations” because they can’t accept that millions of Democrats are donating, according to the group’s statement.

In December 2023, Texas Attorney General Ken Paxton opened an investigation into ActBlue alleging the platform “may enable fraud.”

Paxton said in an Aug. 8 statement ActBlue has cooperated with the Texas investigation and will now require CVV codes for credit card contributions.

In his letter to attorneys general, Steil said whistleblowers reported “anomalies” in Federal Election Commission donor records.

That prompted a data analysis of records spanning 14 years, which looked for suspicious trends by comparing donation patterns to open-source consumer data, voter rolls, and political profiling databases.

The ensuing investigation included consultations with the election commission, the Financial Crimes Enforcement Network, and the Office of Foreign Assets Control, according to Steil’s letter.

Findings included donations that were significantly disproportionate to a person’s net worth or previous giving history; uncharacteristic donations from party-affiliated registered voters that suddenly contributed to candidates of the opposing party; and unusually frequent donations from the elderly and first-time donors.

Information, including donor data, was forwarded to state law enforcement agencies due to the “potential criminal activity” surrounding the political contributions, the letter stated.

Last month, Steil asked the election commission for an emergency rule requiring political campaigns to verify the CVV of donors who contribute online by credit or debit cards and prohibiting campaigns from accepting online contributions from gift cards or other prepaid credit cards.

Steil introduced HR 9488, which would require new procedures and safeguards for online donations to U.S. political committees.

Similar concerns were raised in March 2023 by O’Keefe Media Group, which reported that some senior citizens in Maryland and elsewhere denied making the donations attributed to them in Federal Election Commission records.

Donors contacted by O’Keefe Media Group said they made political contributions to ActBlue but had no knowledge of making what amounted to thousands of donations—with some totaling more than $200,000—in a few years.

The media group found similar anomalies in data from WinRed, a Republican platform similar to ActBlue. The House Administration Committee has not said it is investigating WinRed.

]]>
https://genesiswealthdefense.com/congressional-probe-into-democrat-fundraising-platform-actblue-finds-potential-criminal-activity/feed/ 0 226024
Tech Built Into Chinese-Made Cargo Cranes Could Be a “Trojan Horse” for US Seaports https://genesiswealthdefense.com/tech-built-into-chinese-made-cargo-cranes-could-be-a-trojan-horse-for-us-seaports/ https://genesiswealthdefense.com/tech-built-into-chinese-made-cargo-cranes-could-be-a-trojan-horse-for-us-seaports/#comments Sat, 14 Sep 2024 08:29:50 +0000 https://genesiswealthdefense.com/tech-built-into-chinese-made-cargo-cranes-could-be-a-trojan-horse-for-us-seaports/ (The Epoch Times)—A congressional investigation found that technology embedded in Chinese cargo cranes used in the United States could serve as a “Trojan horse,” giving Beijing the ability to spy on port traffic and even “halt” commerce at U.S. seaports.

The 52-page report, released on Sept. 12, was a joint venture between the Republican-controlled House Homeland Security Committee and the Select Committee on the Chinese Communist Party.

It follows questions from congressional and Senate leaders in the spring surrounding the use of communication equipment discovered on Chinese-manufactured cranes.

The report detailed the rising threat to the U.S. maritime supply chain and national security posed by Chinese-made equipment that could be accessed by Beijing’s military.

The CCP mandates that Chinese companies cooperate with state intelligence agencies.

A joint statement about the report from Reps. John Moolenaar (R-Mich.), Mark Green (R-Tenn.), and Carlos Gimenez (R-Fla.) said the United States was risking its economic security for short-term financial gain by purchasing Chinese equipment for U.S. infrastructure.

“We have given the CCP the ability to track the movement of goods through our ports or even halt port activity at the drop of a hat,” they stated.

“Amid China’s aggression in the Indo-Pacific, our greatest geopolitical adversary could wield this power to influence global military and commercial activity in the event of escalation.”

The U.S. maritime sector is “dangerously reliant” on equipment and technology that has been manufactured and assembled in China, such as ship-to-shore cranes and container handling equipment, according to the report.

With financial support from Beijing, state-controlled Shanghai Zhenhua Heavy Industry Co. (ZPMC) dominates the global maritime equipment and technology market, the report said.

Retired Army Col. John Mills previously told The Epoch Times that the cranes are believed to be an extension of the Chinese Communist Party’s (CCP’s) global cybercrime operation, which could be used to disrupt U.S. ports during an invasion of Taiwan.

“Those container cranes are not cranes,” Col. Mills said. “They’re IP endpoints on a worldwide intelligence collection system.”

The report also noted that Chinese state-owned enterprises, including ZPMC, have made concerted efforts to increase their influence through underpricing equipment and technology, making it more attractive than their competitors.

ZPMC equipment company accounts for nearly 80 percent of the ship-to-shore cranes used by U.S. ports.

Cargo cranes are necessary for the U.S. maritime sector to conduct international trade and military logistical operations during a military conflict.
The report found concerns with ZPMC, which has publicly denied being a cybersecurity threat to the United States.

One problem noted in the document was that ZPMC or its contractors installed cellular modems onto cranes that are currently operational at certain U.S. ports. No contract to install these modems exists.

ZPMC has repeatedly requested remote access to its cranes operating at U.S. ports, with a particular focus on those located on the West Coast, the report said.

That could give China’s military access to the cranes.

Another issue is that ZPMC’s contract requires that all non-ZPMC crane components be shipped to “Changxing Base” in China by third-party companies, such as Sweden, Germany, and Japan.

There, they are installed by ZPMC engineers without oversight from the original manufacturer, raising red flags, according to the report.

The installation of components takes place at or near the Jiangnan Shipyard, where the People’s Liberation Army Navy builds its most advanced warships and houses its intelligence agencies, it noted.

Another potential problem was that contracts between ZPMC and U.S. ports do not contain provisions prohibiting or limiting unauthorized modifications or access to equipment and technology bound for U.S. ports.

The report recommended quick action on removing or disassembling any connection to cellular modems on Chinese-made cranes.

It called for the Department of Homeland Security (DHS) to issue guidance to all U.S. ports using ZPMC cranes to install operational technology monitoring software.

The report also stated that the United States should help provide cybersecurity and port security to Guam, a strategic U.S. ally in the Pacific.

Midterm goals outlined in the report include congressional action to allocate grant money to ports to offset the cost of buying more expensive cranes made by non-adversarial nations.

The United States does not manufacture its own maritime cranes and container equipment, leaving it vulnerable. Manufacturing cranes in America should be a long-term goal, the report stated.

Potential military threats to U.S. seaports stemming from China came to light in February 2021.

The report, citing media accounts, noted that the FBI discovered intelligence-gathering equipment on Chinese cargo cranes that arrived at the Port of Baltimore.

That same year, the Defense Intelligence Agency reportedly conducted a classified assessment, finding that Beijing could potentially throttle port traffic or gather intelligence on military equipment being shipped.

In February 2023, the FBI’s Office of the Private Sector issued an advisory highlighting indicators of malicious Chinese activity in the U.S. maritime sector, including unusual visits and unusually low bids or quotes to supply port equipment and services.

In January, FBI Director Christopher Wray said during a congressional hearing that Chinese Volt Typhoon malware embedded in critical infrastructure throughout the United States had been removed.

Wray said the malware was designed to disrupt and destroy U.S. infrastructure, which would likely be coordinated should a conflict break out between the two nations.

In February, President Joe Biden issued an executive order allowing DHS to address maritime cyber threats and establish cybersecurity standards to secure the networks and systems of U.S. ports.

Aaron Pan contributed to this report.

]]>
https://genesiswealthdefense.com/tech-built-into-chinese-made-cargo-cranes-could-be-a-trojan-horse-for-us-seaports/feed/ 1 225733