Time: Sun May 18 06:56:13 1997 by primenet.com (8.8.5/8.8.5) with ESMTP id GAA16993; Sun, 18 May 1997 06:51:34 -0700 (MST) by usr04.primenet.com (8.8.5/8.8.5) with SMTP id GAA19827; Sun, 18 May 1997 06:51:23 -0700 (MST) Date: Sun, 18 May 1997 06:51:22 -0700 To: (Recipient list suppressed) From: Paul Andrew Mitchell [address in tool bar] Subject: SLS: SNET: Chinese penetrate the Clipper Chip? (fwd) <snip> > >To All: > >This piece is kind of long. I know that. However, it is well worth >reading because it comes close to outlining the actions of our current >administration. > >Our action on this is necessary. If we all do our own unique thing . . . >well, perhaps we can make life just a little less pleasant, and less >profitable, for the communist spys. It's worth a try, and it could be fun, >too. > >This posting, by the way, is going to about thirty others who, like you, >can do something about this problem if they choose to act. And, if all >choose to act in their own way, the problem will be handled on a variety of >fronts. > >Regards, >Doug Fiedor >=============================================== > >Why Red China Targeted the Clinton White House >By Timothy W. Maier >Insight Magazine, May 26, 1997 > > > Beijing's leaders have set their sights on >American encryption and satellite technologies that, >once obtained, could kill vital U.S. intelligence >operations worldwide. The covert plot was launched >in 1992 -- the same year Chinese operatives signed a >military intelligence agreement to share secrets with >Russia. > Red Chinese spies are among us. Their infiltration >is so deep, say U.S. intelligence experts, that the prime >targets appear to be America's supersecret encryption >and satellite technologies. Once obtained, their >possession by Beijing could provide access to the most >sensitive U.S. military secrets and wreck American >intelligence-gathering worldwide. Interviews with >Russian and U.S. intelligence specialists indicate that >China also has plotted covertly to acquire top U.S. >computer technology to disrupt U.S. intelligence >operations and prevent American spies from monitoring >Red Chinese activities. > The current problem involves Bill Clinton's >Chinese friendships, fund-raising and what some consider >the president's contempt for security. But it began much >earlier. > In the 1970s, under the leadership of then- >Secretary of State Henry Kissinger, the United States >became a willing partner of Beijing by providing computer >technology for Chinese missiles, ostensibly for defense >against a Beijing-feared Russian invasion. Senior U.S. >intelligence sources say those missiles now are pointed >at Los Angeles, Hawaii or Alaska. In the meantime, >Kissinger has become a multimillionaire trade partner >for American firms conducting business in China. And, >as Premier Li Peng publicly has stated, "Chinese will >never forget the contributions made by Kissinger" (see >"Lion Dancing With Wolves," April 21). > Two decades later the policy of building up the >Red China military continues. Insight has learned that >a covert operation run by the CIA and National Security >Council, or NSC, last year resulted in providing Beijing >with missile hardware and software including programming >and targeting capabilities and guidance systems, >according to sources familiar with that operation. The >NSC supposedly arranged the deal to set up a >disinformation campaign in which future U.S. data might >be used to disrupt Chinese intelligence, the sources say. >"This was real-time data -- gone -- maybe 10, 20, 30 billion >dollars' worth of technology," one source says. "The >thought was that we had to give away some good stuff for >them to take the bad stuff." > A 1995 General Accounting Office, or GAO, >report ordered by the Pentagon and State Department and >critical of exports to China portrays the United States >as being a blind trading partner of China. The >unclassified report shows that the United States approved >67 export licenses to China for military-industrial >products between 1990 and 1993, including $530 million >of missile-related technology. "The Department of >Justice is concerned the Department of Commerce might >not be identifying or seeking interagency concurrence on >all potential missile technology export-license >applications," the report declares. > According to William Triplett II, former chief >Republican counsel to the Senate Foreign Relations >Committee, the British and French were furious when >Clinton dismantled the Coordinating Committee for >Multilateral Export Controls , or COCOM -- an >international arrangement to prevent export of military >high-tech. That decision, he says, secured the export to >Russia and China this year of supercomputers capable >of building sophisticated nuclear-guidance systems. >California-based Silicon Graphics, now under federal >investigation for illegal exporting, sold the >supercomputers to the China Academy of Sciences and to >a Russian nuclear-weapons lab, claiming the sales were >based on an understanding that the technology would be >used for environmental purposes. The company says it >now feels terrible about these sales. > Insight also has learned that Chinese agents >have formed a secret partnership with Russian military >intelligence, according to intelligence specialists >working closely with the FBI. Intercepting signals >from satellites and breaking into private and government >computer systems are part of the purpose of this joint >agreement secretly signed in 1992, says a former high- >ranking Russian military intelligence agent who was >stationed in Beijing and has spoken exclusively to >Insight. "They shared sensitive information with the >goal of destroying the United States," the agent says, >noting that the U.S. Navy port facilities at Long Beach, >Calif., recently signed over to the China Ocean Shipping >Co. pending civil litigation, are to be used as a joint >Chinese-Russian intelligence operation. > The FBI learned of a major Chinese espionage >plot to influence the elections last year and launched an >investigation. The ex-Russian agent says China's >political leaders initiated the operation after meeting >to discuss how best to penetrate the U.S. government. >"It was a political group decision," the source observes. > What's surprising, says a former NSC staffer, >is the reaction in the administration when the FBI >reported the Chinese plot to influence the elections. >"We have the smoking guns that the Chinese are trying >to direct covert actions against the U.S., and nothing is >done," the former staffer says. "Any other time it would >have meant the expulsion of the Chinese ambassador." > The ex-Russian intelligence agent's allegation >of Chinese penetration has been confirmed by Randolph >Quon, a former Hong Kong investment banker for two >decades. Quon is close to several of the Chinese >princelings -- the sons and nephews of China's ruling >leaders who head the major Red Chinese trading companies. >He says China had a "guan-zi," or connection to get >access, for its U.S. political operation. "Li Peng was >told the Lippo Group had a back channel to the White >House, to Bill Clinton," Quon says, through "deal-maker" >John Huang, the former Commerce official and ex-vice >president of the Indonesia-based Lippo Group, which had >estensive joint ventures with Chinese power companies. >All utility companies in China are operated by the >People's Liberation Army, or PLA, say defense-intelligence >specialists. > Quon claims 20 members of the Communist >Party undertook a "strategic-information warfare campaign >in the U.S." Part of that plan, he says, was taking >control of Lippo -- a company that worked to form a >strong relationship with China for economic and military >opportunities. Four days after Clinton's 1992 victory >the Lippo Group sold 15 percent, and then later 50 >percent, of its interest in the Hong Kong Chinese Bank >to China Resources [Holdings] Co., a Chinese military >front company for spy operations, according to U.S. >defense intelligence agents. > There were a number of objectives to these >moves, but espionage headed the list. The key was >encryption. A former NSC expert on intelligence >encryption says China needs encryption technology >badly and target the United States to get it. "The >Chinese are into information warfare -- the ability to >use computers to collect intelligence and conceivably to >damage the U.S.," says the NSC staffer who served under >Reagan. "It would cause real trouble for the U.S. if >they obtained U.S. encryption technology. It will be a >hit against the quality of American intelligence >operations." > How vulnerable are U.S. defense computers? >An unclassified GAO report ordered in 1996 by the >Senate Governmental Affairs Committee warns there >were 250,000 hacker attacks in 1995, of which 65 percent >were successful penetrations. In addition, it says, 120 >countries are capable of breaking into 2.1 million U.S. >defense computers. Two Dutch hackers successfully >tapped into computers during the Persian Gulf War and >learned the precise locations of troop deployments. They >then attempted to sell the classified information to >Saddam Hussein, who turned it down because he thought it >was a U.S. trick, according to the report. "At a minimum, >these attacks are a multimillion-dollar nuisance to >defense," the GAO report states. "At worst, they are a >serious threat to national security." > Senior U.S. intelligence officials say the >Chinese waited patiently for an opportunity to strike and >found vulnerability in a White House that seemed more >concerned with filling a depleted Democratic National >Committee war chest than with national security. Clinton >denies security has suffered under his tenure, and Vice >President Al Gore says he did nothing wrong in granting >access to big-buck donors, but claims he won't "do it >again." > Sven Kramer, who long served the NSC at >the White House under Republican and Democratic >presidents, says he is disgusted with the cavalier >actions of an administration that critics say put a >dialing-for-dollars campaign ahead of national security. >Kramer asserts he finds it difficult to believe that the >United States would surrender key ports in Long Beach and >at either end of the Panama Canal to a PLA-led shipping >company called COSCO. He cites the "foolishness of the >intelligence community" for not blowing the whistle on >these operations. > He is not alone. Bipartisan former intelligence >officials, who asked not to be identified, trace this >national-security breakdown to Clinton's out-of-control >fund-raising campaign. They cite the selling of White >House access to drug dealers and heads of Chinese gun- >smuggling companies, as well as presidential one-on-ones >with sons and daughters of the highest commanders in the >PLA. They note that security clearances were overlooked >and access to the president and high administration >policy wonks was granted without so much as a FBI >background check even for White House coffee-klatsch >guests. > Remember that in 1992 American voters elected >Clinton as one who viewed the rulers of China as the >"butchers of Beijing." Former Time journalists Ross >Munro and Richard Bernstein write in their book, Coming >Conflict with China, that the Chinese realized they needed >to turn Clinton around and looked for ways to do so. The >Chinese call it "zou-hou-men," which translates as back >door. "The phrase expresses the realistically cynical view >that qualifications, skill and lower prices mean less in >China than the ability to skirt the official rules and to >slip into the Palace of Power via the rear entrance," the >authors write. > One way to skirt the process was to get American >businesses to do the lobbying for China's "most favored >nation," of MFN, trading status and to get big donors to >persuade Clinton to support MFN. China expert Orville >Schell, dean of the graduate school of journalism at the >University of California at Berkeley, says the Chinese >attempt to influence policy may have been a clumsy effort >to establish a beachhead, but that the influence peddling >most likely was done to get American business on their >side. > "I would not be looking for a suitcase of money >to a senator and congress," Schell says. "Now there may >be some of that. But what is really going on is China is >doing a more indirect approach -- they are buying and >selling more joint ventures. China's leaders know it's >who you know. They know the real influence is with >American business because they know businesses can exert >pressure." > But for China to influence Clinton it needed a back >door to the White House to push Beijing's agenda -- or >risk losing billions if MFN were rejected. The door was >there. Enter John Huang, that former vice president of >the Lippo Group, whose whereabouts now are unknown. >Although he was granted top-secret clearance on Jan. 31, >1994, Huang officially didn't begin work as deputy >assistant secretary of Commerce for international >economic policy until July 18, 1994. > Senate investigators characterize Huang as a >"human vacuum cleaner" who sifted through an enormous >amount of classified information dealing with China as if >he knew his opportunity to do so would be short-lived. >During his 18 months at the Commerce Department, Huang >was privy to at least 109 intelligence briefings -- 70 in >1994 and 39 in 1995, according to recently released >records from Commerce. The numbers are a far cry from >the 37 classified briefings initially admitted by Commerce, >and this has Senate investigators extremely upset. "We >could have been plugging up holes" and controlling the >damage, says an angry investigator. "The FBI is now doing >a damage assessment." > Other former senior intelligence officers in both >NSC and the National Security Agency, or NSA, say it >would have been extremely unusual for Huang, who served >in the Taiwan air force, to have been cleared for such >access with a background check. "That's only done with >congressmen," says a former senior NSA official. > Senate investigators say they are concerned about >Huang meeting with a Chinese Embassy official inside his >Commerce office 30 minutes after being briefed by John >Dickerson, head of the CIA's office of intelligence >liaison at Commerce. Records also show Huang placed >at least six telephone calls to Lippo shortly after >intelligence briefings. Alarmed intelligence sources say >Huang's top-secret clearance would have allowed him to >see hundreds of classified documents in addition to >attending briefings. > Huang's clearance was not pulled until Dec. 9, >1996, nearly a year after he left Commerce to join the >DNC fund-raising campaign as a finance vice chairman, >Commerce records show. It is yet to be revealed whether >he attended classified meetings while at the DNC. > "What this says is that Huang's security clearance >was waived," former NSC staffer Kramer says. "That's is >rare and far too generous of the president. The president >can waive security if it is considered urgent in order to >go on a trip or be involved rapidly in a project." >Records show Huang was not planning any trips. > Commerce claims the clearance was needed for >an International Trade Administration security briefing >but acknowledges no records exist to show the briefing >ever occurred. That raises the question: What was Huang >secretly involved in? Of utmost concern is whether he was >briefed on a top-secret project dubbed "Clipper Chip." >This "bug-on-the-chip" project, as some intelligence >officials call it, began in 1987 inside the NSA to help >the Fort Meade, Md., spy agency snoop on its enemies >and protect secrets in a joint partnership with federal >law-enforcement agencies. > Initially the Clipper Chip was an electronic >device used to secure telephones, but after years of >research the Son of Clipper was developed. It was to be >placed inside every American-built computer of fax >machine to protect it from hackers. The chip also >permitted wire-tapping through unique keys that unlock >communications encrypted with the chip. The keeper of >the keys, according to the plan crafted at the Clinton >White House, would be the FBI and Commerce. In a >storm of controversy loud warnings of invasion of privacy >came from the private communications sector -- with the >exception of AT&T, which installed the chip. The >Clipper Chip was killed last year for commercial use, >though it remained in federal computers until giving way >to a new system in March 1997. > NSA records show Clipper Chip meetings were >held with NSA, NSC, CIA, FBI and Commerce officials, >as well as with former Associate Attorney General and >convicted Whitewater attorney Webster Hubbell and former >Deputy White House Counsel Vince Foster, two months >before Foster died in 1993. Investigators still are >trying to determine if Huang attended any of these >briefings. > Commerce spokeswoman Brenda Dolan insists >that "John Huang has nothing to do with the Clipper Chip, >nor should he have. He worked in the international trade >administration. He did not work in export of the Clipper >Chip." But Senate sources tell Insight that Huang >attended weekly CIA and China meetings at which such >technology may have been discussed. His top-secret >classification would have allowed him to view Clipper >Chip documents if he chose, according to intelligence and >Senate sources. > The NSA, one of the strongest supporters of the >chip, warns of enemies obtaining it. In a partially >unclassified document labeled "Secret Introduction," the >NSA says the "use of strong cryptographic products by >the myriad of criminal and hostile intelligence agents >poses an extremely serious and unacceptable threat to >effective law enforcement, the public safety and national >security." > Dorothy E. Denning, professor of computer science >at Georgetown University and author of Cryptography and >Data Security, supports the use of the chip for law- >enforcement activities. FBI statistics indicate >authorized wiretaps have led to the conviction of 20,000 >felons resulting in $296 million in fines, $756 million >in court-ordered restitution and $1.8 billion saved in >potential economic loss. > Denning claims it nearly is impossible to crack >the Clipper systems. "You have to penetrate and you >would have to get in the building, then you would have >to get in the safe and then the computer keys," she says. > "It's not realistic and even if you have the keys it's not >useful unless you have the right equipment." > The safe room holding the keys is what Charlie >Smith, president of Virginia-based Softwar Co. and a >critic of Clipper, calls the "Mission Impossible" room, >with the big mainframe computer, stacks of classified >data, secret radio frequencies and wired alarm systems. >"It's a highly classified library with guards," Smith >says. "The clipper or key recovery as it is currently >being called was supposed to protect government secrets. >Instead, they have built an electronic version of Pearl >Harbor and put it neatly in one little row where one guy >can walk in and then walk out with it." > There also are others involved in Clinton fund- >raising to whom congressional committees are anxious >to pose questions about interest in secret U.S. >technology. Ira Sockowitz, a Clinton administration >lawyer, admitted during a deposition with Judicial Watch, >a Washington-based watchdog group pursuing the Clipper >documents in relation to Huang's activities at Commerce, >that he walked out of the Commerce Department with CIA, >NSC and NSA classified files on encryption or decoding >software, spy satellites, China, Russia and other >countries. Sockowitz, who had a top-secret clearance, >was appointed by Clinton to serve as a special legal >counsel in Commerce. He says he simply was transferring >the files to his new post at the Small Business >Administration, where he became deputy administrator in >the spring of 1996. The records removed contain some >2,800 pages, including a classified report called "A >Study of the International Market for Computer Software >With Encryption." > Sockowitz, now a Washington consultant, claims >he never met Huang, although the two men worked together >on the Asian Pacific American Working Group -- the >principal unit in the DNC responsible for raising about >$7 million in campaign contributions in the Asian >communities during 1996 -- much of it returned because >of questionable origins. > How spooky does it get? An odd link to this >story is that the NSA chose Arkansas-based Systematics >on Sept. 14, 1990, to construct the "Mission Impossible" >room called the Secured Compartmentalized Information >Facility, or SCIF, in Fort Gillem, Ga., according to an >unclassified NSA memo. At that time Systematics was run >by Jackson Stephens who, along with Mochtar Riady and >James Riady controlled Lippo's Worthen bank, which gave >Clinton a multimillion-dollar loan to get through the >1992 presidential election. The same Lippo Group, which >later dumped Worthen, is linked to China Resources, a >front for Chinese military-intelligence operations, say >U.S. defense intelligence sources. > The concern of the U.S. intelligence community >is whether Chinese agents penetrated the SCIF. An NSA >staffer notes that the Chinese once managed to bug the >Russian Embassy in Beijing, and that if they built the >SCIF "they could do a lot of things there." > That brings the story back to Huang, who worked >with the Riadys at Worthen Bank and appears to have >formed another intriguing friendship with PLA arms dealer >and White House coffee-klatsch guest Wang Jun. China's >Far Eastern Economic Review reported in April that Wang >admitted to Beijing's political leaders that he had paid >Huang $30,000 for reasons unexplained. One Senate >investigator says this could be the "smoking gun" that >ties Huang to the PLA. If so , it may help prove that >the spies among us walked away with U.S. national secrets >of incalculable value -- and tie the operation directly >to the Clinton team. > > > > >-> Send "subscribe snetnews " to majordomo@world.std.com >-> Posted by: kalliste@aci.net (J. Orlin Grabbe) > > > ======================================================================== Paul Andrew, Mitchell, B.A., M.S. : Counselor at Law, federal witness email: [address in tool bar] : Eudora Pro 3.0.1 on Intel 586 CPU web site: http://www.supremelaw.com : library & law school registration ship to: c/o 2509 N. Campbell, #1776 : this is free speech, at its best Tucson, Arizona state : state zone, not the federal zone Postal Zone 85719/tdc : USPS delays first class w/o this ========================================================================
Return to Table of Contents for
Supreme Law School: E-mail