Top Navy Officer FIRED by Obama For Exposing Massive Chinese Threat to US
Another patriot bites the dust for exposing Obama’s criminal actions. When will Americans wake up to the tyranny going on?
President Barack Obama’s been on a roll when it comes to firing military officers — especially those who aren’t afraid to speak out against the administration and expose what’s really happening behind the scenes.
That seems to be the case with Capt. James Fanell, a senior Navy intelligence leader who wasrelieved from his position as the U.S. Pacific Fleet’s director of intelligence and information operations because he made public information about China that Obama didn’t want you to hear.
His comments, now being labeled “provocative,” revealed that after a recent Chinese amphibious exercise, naval intelligence officials assessed that China’s strategy was to be able to launch a “short, sharp war,” with Japan.
Fannell said the following about Chinese naval intentions: “(We believe) the (People’s Liberation Army) has been given the new task to be able to conduct a short, sharp war to destroy Japanese forces in the East China Sea following with what can only be expected (as) a seizure of the Senkakus or even southern Ryukyu (islands).”
Those actions could potentially lead to something along the lines of World War III.
According to Pentagon brass, this information runs counter to their daily talking points about “building ties” with the Chinese Navy, a force which appears to be more assertive than ever before.
Adm. Harry Harris, in charge of PACFLT, relieved Fannel from his position as an intelligence director. According to Military Times, he was reassigned as an aid to Rear Adm. Randy Crites at PACFLT’s maritime headquarters — which is a long fall from his previous position.
In other words, he was punished for exposing a massive threat to the United States that Obama and his administration didn’t want you to know about.
You don’t say? A true Chicago thug taking out anyone who raises the alarm
Fannell reportedly has plenty of support within the naval intelligence community for voicing his views on China’s growing aggression toward countries like Japan and even the United States.
As a 29-year naval intelligence officer, Fannell has more credibility and insider knowledge than most others in his branch of service.
China submarines outnumber U.S. fleet: U.S. admiral
(Reuters) – China is building some “fairly amazing submarines” and now has more diesel- and nuclear-powered vessels than the United States, a top U.S. Navy admiral told U.S. lawmakers on Wednesday, although he said their quality was inferior.
Vice Admiral Joseph Mulloy, deputy chief of naval operations for capabilities and resources, told the House Armed Services Committee’s seapower subcommittee that China was also expanding the geographic areas of operation for its submarines, and their length of deployment.
For instance, China had carried out three deployments in the Indian Ocean, and had kept vessels out at sea for 95 days, Mulloy said.
“We know they are out experimenting and looking at operating and clearly want to be in this world of advanced submarines,” Mulloy told the committee.
U.S. military officials in recent months have grown increasingly vocal about China’s military buildup and launched a major push to ensure that U.S. military technology stays ahead of rapid advances by China and Russia.
Mulloy said the quality of China’s submarines was lower than those built by the United States, but the size of its undersea fleet had now surpassed that of the U.S. fleet. A spokeswoman said the U.S. Navy had 71 commissioned U.S. submarines.
U.S. submarines are built by Huntington Ingalls Industries Inc. and General Dynamics Corp.
In its last annual report to Congress about China’s military and security developments, the Pentagon said China had 77 principal surface combatant ships, more than 60 submarines, 55 large and medium amphibious ships, and about 85 missile-equipped small combatants.
Mulloy did not provide details about the number of surface ships now operated by China.
He said the U.S. military did not believe China carried nuclear missiles on its submarines, but that it had been producing missiles and testing them.
The group’s attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency.
The tools, exploits and malware used by the group — named after its penchant for encryption — have strong similarities with NSA techniques described in top-secret documents leaked in 2013.
Countries hit the most by Equation include Iran, Russia, Pakistan, Afghanistan, India and China. Targets in those countries included the military, telecommunications, embassies, government, research institutions and Islamic scholars, Kaspersky said.
Kaspersky’s most striking finding is Equation’s ability to infect the firmware of a hard drive, or the low-level code that acts as an interface between hardware and software.
The malware reprograms the hard drive’s firmware, creating hidden sectors on the drive that can only be accessed through a secret API (application programming interface). Once installed, the malware is impossible to remove: disk formatting and reinstalling the OS doesn’t affect it, and the hidden storage sector remains.
“Theoretically, we were aware of this possibility, but as far as I know this is the only case ever that we have seen of an attacker having such an incredibly advanced capability,” said Costin Raiu, director of Kaspersky Lab’s global research and analysis team, in a phone interview Monday.
Drives made by Seagate Technology, Western Digital Technologies, Hitachi, Samsung Electronics and Toshiba can be modified by two of Equation’s hard disk drive malware platforms, “Equationdrug” and “Grayfish.”
The report said Equation has knowledge of the drives that goes way beyond public documentation released by vendors.
Equation knows sets of unique ATA commands used by hard drive vendors to format their products. Most ATA commands are public, as they comprise a standard that ensures a hard drive is compatible with just about any kind of computer.
But there are undocumented ATA commands used by vendors for functions such as internal storage and error correction, Raiu said. “In essence, they are a closed operating system,” he said.
Obtaining such specific ATA codes would likely require access to that documentation, which could cost a lot of money, Raiu said.
The ability to reprogram the firmware of just one kind of drive would be “incredibly complex,” Raiu. Being able to do that for many kinds of drives from many brands is “close to impossible,” he said.
“To be honest, I don’t think there’s any other group in the world that has this capability,” Raiu said.
It appears Equation has been far, far ahead of the security industry. It’s almost impossible to detect this kind of tampering, Raiu said. Reflashing the drive, or replacing its firmware, is also not foolproof, since some types of modules in some types of firmware are persistent and can’t be reformatted, he said.
Given the high value of this exploitation technique, Equation very selectively deployed it.
“During our research, we’ve only identified a few victims who were targeted by this,” Kaspersky’s report said. “This indicates that it is probably only kept for the most valuable victims or for some very unusual circumstances.”
Another of Kaspersky’s intriguing findings is Fanny, a computer worm created in 2008 that was used against targets in the Middle East and Asia.
To infect computers, Fanny used two zero-day exploits — the term for a software attack that uses an unknown software vulnerability — that were also coded into Stuxnet, Kaspersky said. Stuxnet, also a Windows worm, was used to sabotage Iran’s uranium enrichment operations. It is thought to be a joint project between the U.S. and Israel.
It’s unlikely the use of the same zero-days was a coincidence. Kaspersky wrote that the similar use of the vulnerabilities means that the Equation group and the Stuxnet developers are “either the same or working closely together.”
“They are definitely connected,” Raiu said.
Both Stuxnet and Fanny were designed to penetrate “air-gapped” networks, or those isolated from the Internet, Kaspersky said.
The Equation group also used “interdiction” techniques similar to those used by the NSA in order to deliver malicious software to targets.
Kaspersky described how some participants of a scientific conference held in Houston later received a CD-ROM of materials. The CD contained two zero-day exploits and a rarely-seen malware doorstop nicknamed “Doublefantasy.”
It is unknown how the CDs were tampered with or replaced. “We do not believe the conference organizers did this on purpose,” Kaspersky said. But such a combination of exploits and malware “don’t end up on a CD by accident,” it said.
The NSA’s Office of Tailored Access Operations (TAO) specializes in intercepting deliveries of new computer equipment, one of the most successful methods of tapping into computers, wrote Der Spiegel in December 2013, citing a top secret document.
The German publication was one of several that had access to tens of thousands of spy agency documents leaked by former NSA contractor Edward Snowden.
Kaspersky uncovered the trail of the Equation group after investigating a computer belonging to a research institute in the Middle East that appeared to be the Typhoid Mary for advanced malware.
Raiu said the machine had French, Russian and Spanish APT (advanced persistent threat) samples on it among others, showing it had been targeted by many groups. It also had a strange malicious driver, Raiu said, which upon investigation lead to the extensive command-and-control infrastructure used by Equation.
Kaspersky analysts found more than 300 domains connected with Equation, with the oldest one registered in 1996. Some of the domain name registrations were due to expire, so Kaspersky registered around 20 of them, Raiu said.
Most of the domain names aren’t used by Equation anymore, he said. But three are still active. The activity, however, doesn’t lend much of a clue as to what Equation is up to these days, as the group changed its tactics in late 2013.
“Those three [domains] are very interesting,” Raiu said. “We just don’t know what malware is being used.”
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
Slowly but surely Europe is figuring out that as a result of the western economic and financial blockade of Russian, it is Europe itself that is suffering the most. And while Germany was first to acknowledge this late in 2014 when its economy swooned and is now on the verge of a recession, now others are catching on. Case in point: the former head of the European Commission, and Italy’s former Prime Minister, Romano Prodi who told Messaggero newspaper that the “weaker Russian economy is extremely unprofitable for Italy.”
Lowered prices in the international energy markets have positive aspects for the Italian consumers, who pay less for the fuel, but the effect will be only short-term. In the long-term however the weaker economic situation in countries producing energy resources, caused by lower oil and gas prices, mostly in Russia, is extremely unprofitable for Italy, he said.
“The lowering of the oil and gas prices in combination with the sanctions, pushed by the Ukrainian crisis, will drop the Russian GPD by five percent per annum, and thus it will cause cutting of the Italian export by about 50%,” Prodi said.
“Setting aside the uselessness or imminence of the sanctions, one should highlight a clear skew: regardless of the rouble rate against dollar, which is lower by almost a half, the American export to Russia is growing, while the export from Europe is shrinking.”
In other words, just as slowly, the world is starting to grasp the bottom line: it is not the financial exposure to Russia, or the threat of financial contagion should Russia suffer a major recession or worse: it is something far simpler that will lead to the biggest harm for Europe’s countries. The lack of trade. Because while central banks can monetize everything, leading to an unprecedented asset bubble which if only for the time being boosts investor and consumer confidence, they can’t print trade – that all important driver of growth in a globalized world long before central banks were set to monetize over $1 trillion in bonds each and every year to mask the fact that the world is deep in a global depression.
Which is why we read the following report written in yesterday’s Deutsche Wirtschafts Nachrichten with great interest because it goes right to the bottom line. In it Russia has a not so modest proposal to Europe: dump trade with the US, whose call for Russian “costs” has cost you another year of declining economic growth, and instead join the Eurasian Economic Union! From the source:
Russia has presented a startling proposal to overcome the tensions with the EU: The EU should renounce the free trade agreement with the United States TTIP and enter into a partnership with the newly established Eurasian Economic Union instead. A free trade zone with the neighbors would make more sense than a deal with the US.
It surely would, but then how will Europe feign outrage when the NSA is found to have spied yet again on its “closest trading partners?” Some more on Russia’s proposal from EUobserver:
Vladimir Chizhov told EUobserver: “Our idea is to start official contacts between the EU and the EAEU as soon as possible. [German] chancellor Angela Merkel talked about this not long ago. The EU sanctions [on Russia] are not a hindrance”.
“I think that common sense advises us to explore the possibility of establishing a common economic space in the Eurasian region, including the focus countries of the Eastern Partnership [an EU policy on closer ties with Armenia, Azerbaijan, Belarus, Georgia, Moldova, and Ukraine]”.
“We might think of a free trade zone encompassing all of the interested parties in Eurasia”.
He described the new Russia-led bloc as a better partner for the EU than the US, with a dig at health standards in the US food industry.
“Do you believe it is wise to spend so much political energy on a free trade zone with the USA while you have more natural partners at your side, closer to home? We don’t even chlorinate our chickens”, the ambassador said.
The treaty establishing the Eurasian Union entered into life on Thursday (1 January).
It includes Armenia, Belarus, Kazakhstan, and Russia, with Kyrgyzstan to join in May.
Modelled on the EU, it has a Moscow-based executive body, the Eurasian Economic Commission, and a political body, the Supreme Eurasian Economic Council, where member states’ leaders take decisions by unanimity.
It has free movement of workers and a single market for construction, retail, and tourism. Over the next 10 years, it aims to create a court in Minsk, a financial regulator in Astana and, possibly, to open Eurasian Economic Commission offices in Astana, Bishkek, Minsk, and Yerevan.
It also aims to launch free movement of capital, goods, and services, and to extend its single market to 40 other sectors, with pharmaceuticals next in line in 2016.
And as a reminder: The Eurasian Economic Union, a trade bloc of former Soviet states, expanded to four nations Friday when Armenia formally joined, a day after the union between Russia, Belarus and Kazakhstan began.
So the ball is in your court, Europe: will it be a triple-dip (and soon thereafter quadruple: see Japan) recession as your Goldman-controlled central bank plunders ever more of what little is left of middle-class wealth with promises that this year – for real – is when it all turns around, or will Europe acknowledge it has had enough and shifts its strategic, and trade, focus from west (speaking of the TTIP, Germany’s agriculture minister just said “We can’t protect every sausage” referring to the TTIP) to east?
Considering just whose interests are represented by the unelected bureaucrats in Brussels, we won’t be holding our breath.
Families seek answers after 36 die in Shanghai New Year’s Eve stampede
SHANGHAI – People unable to contact friends and relatives streamed into hospitals Thursday, anxious for information after a stampede during New Year’s celebrations in Shanghai’s historic waterfront area killed 36 people in the worst disaster to hit one of China’s showcase cities in recent years.
The Shanghai government said 47 others received hospital treatment, including 13 who were seriously injured, after the chaos about a half-hour before midnight. Seven of the injured people had left hospitals by Thursday afternoon.
The Shanghai government information office said one Taiwanese was among the dead, and two Taiwanese and one Malaysian were among the injured.
The deaths and injuries occurred at Chen Yi Square in Shanghai’s popular riverfront Bund area, an avenue lined with art deco buildings from the 1920s and 1930s when Shanghai was home to international banks and trading houses.
The area is often jammed with people during major events.
Andrew Jordan Shainker, a 28-year-old American who said he watched the disaster unfold from a restaurant, told The Wall Street Journal, “It was utter chaos.”
At one of the hospitals where the injured were being treated, police brought out photos of unidentified dead victims, causing dozens of waiting relatives to crowd around. Not everyone could see, and young women who looked at the photos broke into tears when they recognized someone.
A saleswoman in her 20s, who declined to give her name, said she had been celebrating with three friends. “I heard people screaming, someone fell, people shouted `don’t rush,”‘ she said. “There were so many people and I couldn’t stand properly.” She added that she still could not contact one of her friends.
The official Xinhua News Agency quoted a woman with the surname Yin who was caught with her 12-year-old son in the middle of crowds of people pushing to go up and down steps leading from the square.
“Then people started to fall down, row by row,” Yin said. When her son was finally brought to safety, he had shoe prints over his clothes, “his forehead was bruised, he had two deep creased scars on his neck, and his mouth and nose were bleeding,” she said.
Xia Shujie, vice president of Shanghai No. 1 People’s Hospital, told reporters that some of the victims had been suffocated.
At the hospital, which was guarded by police, a man who would give only his surname, Li, said he had identified his wife’s cousin among the dead.
Relatives desperately seeking information earlier tried to push past hospital guards, who used a bench to hold them back. Police later allowed family members into the hospital.
CCTV America, the U.S. version of state broadcaster China Central Television, posted a video of Shanghai streets after the stampede showing piles of discarded shoes amid the debris.
One photo from the scene shared by Xinhua showed at least one person doing chest compressions on a shirtless man while several other people lay on the ground nearby, amid debris. Another photo showed the area ringed by police.
On Thursday morning, dozens of police officers were in the area and tourists continued to wander by the square, a small patch of grass dominated by a statue of Chen Yi, the city’s first Communist mayor.
Steps lead down from the square to a road across from several buildings.
“We were down the stairs and wanted to move up and those who were upstairs wanted to move down, so we were pushed down by the people coming from upstairs,” an injured man told Shanghai TV. “All those trying to move up fell down on the stairs.”
Xinhua quoted witness Wu Tao as saying some people had scrambled for coupons that looked like dollar bills bearing the name of a bar that were being thrown out of a third-floor window. But police dismissed speculation that the coupons had triggered the stampede, saying they were thrown after the tragedy. The cause of the stampede was still under investigation.
Last week, the English-language Shanghai Daily reported that the annual New Year’s Eve countdown on the Bund that normally attracts about 300,000 people had been canceled, apparently because of crowd control issues. The report said a “toned-down” version of the event would be held instead but that it would not be open to the public.
The stampede appeared to be near that area. The city apparently did not expect that so many people would assemble there and was not adequately prepared.
Did The US Take Down North Korea’s Internet? Complete Outage in NK
Obama pledged a response to North Korea last week
Researchers report that North Korea’s internet has gone dark today.
The New York Times reports the network failure or probable take down is one of the worst in years.
North Korea’s internet is managed by Star Joint Venture, a state-run company that routes much of its traffic through China Unicom, China’s state-owned telecommunications company.
According analysts, North Korea began experiencing problems on Friday after Obama pledged a response to the unsubstantiated claim the government of Kim Jong-un was responsible for a hack at Sony Pictures after the movie studio produced a film portraying the murder of Jong-un.
“Their networks are under duress,” said Doug Madory, director of Internet analysis at Dyn Research. “This is consistent with a DDoS attack on their routers.”
“The situation now is they are totally offline,” Madory told Bloomberg. “I don’t know that someone is launching a cyber-attack against North Korea, but this isn’t normal for them.”
“I haven’t seen such a steady beat of routing instability and outages in KP before. Usually there are isolated blips, not continuous connectivity problems. I wouldn’t be surprised if they are absorbing some sort of attack presently.”
A top lawmaker is urging the Pentagon to review its military engagement policy with China amid concerns that cooperation has provided more benefits to Beijing and failed to convince the Chinese military to cease aggressive actions in the Asia-Pacific.
Rep. Randy Forbes (R., Va.), leader of the House Armed Services Committee’s Seapower and Projection Forces Subcommittee, sent a letter on Wednesday to Secretary of Defense Chuck Hagel and Deputy Secretary of Defense Robert Work. Forbes requested a “review of the [Defense] Department’s current mil-mil engagement policy with China, ideally as part of a larger [Pentagon] review of U.S security objectives in the region.”
“I believe that the Department currently lacks the thorough guidance and oversight mechanisms necessary to maintain a consistent mil-mil policy that best serves U.S. national security objectives over the ‘long-haul’ of the emerging U.S.-China peacetime competition,” he wrote.
Forbes said he could point to “multiple examples” where various defense officials, including Hagel’s office and the Pacific Command commander, “were pursuing multiple, divergent mil-mil engagement objectives.”
Several concerns have been raised about U.S.-China military cooperation. In May, Chinese Gen. Fang Fenghui visited the aircraft carrier USS Ronald Reagan in San Diego—a potential violation of provisions in the National Defense Authorization Act for fiscal year 2000. The law forbids military exchanges with China in areas such as “force projection operations,” but the Pentagon said at the time that it did not view the visit as a breach of the act.
A retired Chinese admiral later told a state news agency that Gen. Fang acquired valuable information about the Reagan’s capabilities.
“While our engagements demonstrate our military capabilities to China, enhancing our deterrent to a degree, I am concerned that they also have the potential to decrease China’s uncertainty about possible responses to their actions, which may only cause China to conclude that it can take more risks,” Forbes wrote in his letter.
Additionally, China conducted flight tests last month of its new J-31 stealth fighter jet, an aircraft that allegedly contains technology stolen from the U.S. F-35 Joint Strike Fighter (see story). The Chinese military is suspected of obtaining the F-35 secrets through cyber attacks on a Lockheed Martin subcontractor. While the tests occurred, President Barack Obama was pressing Chinese leaders at an Asian economic summit to reduce incidences of cyber theft.
Obama also reached military agreements at the summit with Chinese President Xi Jinping that aimed to avoid future conflicts in Asia.
Forbes said in his letter that “there is no indication that more engagement has helped to shape Beijing’s actions in a positive direction consistent with U.S. objectives.”
“To the contrary, as we have increased our mil-mil engagement over the past two years, China’s actions have only turned more coercive,” he said. “As our military chiefs have increased their relationships with their counterparts (individuals who can, at any time, order Chinese vessels and aircraft to stand down from taking provocative actions), reckless incidents at sea and in the air have continued to occur and China has resorted to new forms of coercion against its neighbors in the East and South China Seas.”
China has employed increasingly aggressive actions to claim disputed territory in the Asia-Pacific region, such as erecting structures on islands claimed by the Philippines. The Chinese military has also engaged in recent encounters with U.S. planes and ships that the Pentagon has described as “dangerous.”
A Chinese fighter jet in August came within 20 feet of a U.S. anti-submarine warfare aircraft in international airspace, and a Chinese tank landing ship almost forced a collision with the USS Cowpens in December in the South China Sea.
The incidents came as China continues a years-long buildup in its conventional, nuclear, and cyber warfare capabilities. China also recently conducted a third flight test for its new hypersonic strike vehicle that is part of Beijing’s program to penetrate U.S. strategic missile defenses.
Forbes said that while he does “not subscribe to an alarmist school about the emergence of a strong [People’s Republic of China] … I do believe China has the potential to pose the greatest challenge to the liberal-international order since the end of the Cold War.”
A Pentagon spokesman declined to comment about the letter and said a response would be sent directly to Forbes, not the press.
CULVER CITY, Calif. — Sony staffers received a new email from hackers Friday, this time threatening their families, from the group that calls itself the Guardians of Peace or the “GOP.”
At the same time, someone purporting to be the GOP released another, massive, file dump on Friday, posting them on a sharing site called Pastebin.
“It’s over 100 gigabytes,” said Daniel Tentler, with the security firm Carbon Dynamics. He is dissecting the file.
The posting was titled “Gift of GOP for 3rd day: Financial data of Sony Pictures.”
The file was compressed and it wasn’t immediately clear what it contained. However, whoever posted it claimed it included “many pieces of confidential data” in the accompanying message.
The message also read, “Anyone who loves peace can be our member. Please tell your mind at the email address below if you share our intention.” The email directed readers to a site that gives users anonymous, disposable email addresses.
In a final line,which could mean that Sony will have its private data dripped slowly out into public arena, the message read, “The data to be released next week will excite you more.”
These two secondary assaults come after Sony has spent all week shifting email to new servers, instructing staffers to change passwords, and turning back the clock to old-school time-punch cards in order to process employees’ payment.
All of these efforts were made by Sony to thwart another attack by the GOP (easily confused with the political party). But an email – somewhat garbled in style – that landed in many staffers inboxes on Friday proved Sony’s scramble is so far insufficient.
The email included a warning to all Sony employees who did not assist the GOP that their families could land in harm’s way, according to a person unauthorized to speak publicly about the situation. Sony employees have been instructed to turn off mobile and tablet devices.
“We understand that some of our employees have received an email claiming to be from GOP,” Robert Lawson, a spokesperson for Sony, told USA TODAY. “We are aware of the situation and are working with law enforcement.”
The FBI said they were also aware of the GOP’s latest threat.”The FBI is aware of threatening emails that have been received by some employees at Sony Pictures Entertainment,” said FBI press officer Joshua Campbell in a statement. “We continue to investigate this matter in order to identify the person or group responsible for the recent attack on the Sony Pictures network.”
Sony has had computer security teams working round the clock to rescue what they can from the company’s crippled servers since the initial attack was discovered on Nov. 24.
At the time, company officials had all staffers stay off of email and avoid the company’s internal WiFi network, to maintain security while they tried to rebuild. Some have suggested that the attack is in retaliation for a forthcoming comedy produced by Sony called The Interview. North Korea has denied any involvement.
A new round of emails threatening staff could signal that the attackers didn’t simply commit one of the largest hit-and-run cyber attacks on a U.S. company, but intend to continue toying with the firm as it struggles to get back on its feet.
Read the email in full, per Variety(emphasis added).
I am the head of GOP who made you worry.
Removing Sony Pictures on earth is a very tiny work for our group which is a worldwide organization. And what we have done so far is only a small part of our further plan.It’s your false if you if you think this crisis will be over after some time. All hope will leave you and Sony Pictures will collapse. This situation is only due to Sony Pictures. Sony Pictures is responsible for whatever the result is. Sony Pictues clings to what is good to nobody from the beginning. It’s silly to expect in Sony Pictures to take off us. Sony Pictures makes only useless efforts. One beside you can be our member.
Many things beyond imagination will happen at many places of the world. Our agents find themselves act in necessary places. Please sign your name to object the false of the company at the email address below if you don’t want to suffer damage. If you don’t, not only you but your family will be in danger.
Nobody can prevent us, but the only way is to follow our demand. If you want to prevent us, make your company behave wisely.
77 Chinese nationals arrested for Internet hacking in Kenya
NAIROBI, Kenya — Police in Kenya are consulting technical experts to determine if 77 Chinese nationals arrested with advanced communications equipment in several houses in an upscale Nairobi neighborhood were committing espionage, an official said Thursday.
The Chinese were arrested since the weekend with equipment that Kenya’s Daily Nation newspaper said was capable of hacking into government servers.
“We have roped in experts to tell us if they were committing crimes of espionage,” said Ndegwa Muhoro, the head of criminal investigations for Kenya’s police. “These people seem to have been brought here specifically for a mission which we are investigating.”
The arrests began on Sunday, when computer equipment in one of the upscale houses the Chinese nationals had rented near the U.S. Embassy and U.N. headquarters caught fire, killing one person.
Police said it appeared the group was manufacturing ATM cards, and that the suspects may have been involved in money laundering and Internet fraud. The case has caught the attention of the highest levels of Kenya’s government as authorities investigate whether the group was also engaging in espionage.
The minister of foreign affairs and the minister of information communications and technology both were on hand Wednesday as police arrested 40 people. The Chinese ambassador was summoned to the foreign affairs ministry over the arrests.
The 37 suspects arrested Sunday were charged with operating an illegal radio station. Many of those arrested cannot speak English and some don’t have identification such as a passport, police detective Nicholas Kisavi said.