CCP Actions In The US And Around The World

GURPS

INGSOC
PREMO Member

US officials search for hidden Chinese malware that could affect military operations



The administration believes malicious computer code has been hidden inside “networks controlling power grids, communications systems and water supplies that feed military bases,” officials told the Times. The discovery has heightened concerns that hackers could “disrupt US military operations in the event of a conflict,” according to the Times. The two nations have been increasingly at odds over Taiwan as well as over China’s actions in the Indo-Pacific.

One congressional official told the newspaper that the malware was “a ticking time bomb” that could allow China to cut off power, water and communications to military bases, slowing deployments and resupply operations. Because military bases often share the same supply infrastructure as civilian homes and businesses, many other Americans could also be affected, officials told the Times.

The malware revelations echo a pattern of recent breaches by China-based hackers previously reported by CNN.



The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.


relates to The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies




In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA.

To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China.

This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.



The Long Hack: How China Exploited a U.S. Tech Supplier




Whether that probe continues is unknown, as is a full account of its findings. But as recently as 2018, the FBI enlisted private-sector help in analyzing Supermicro equipment that contained added chips, according to an adviser to two security firms that did the work.

The Supermicro saga demonstrates a widespread risk in global supply chains, said Jay Tabb, a former senior FBI official who agreed to speak generally about China’s interference with the company’s products.

“Supermicro is the perfect illustration of how susceptible American companies are to potential nefarious tampering of any products they choose to have manufactured in China,” said Tabb, who was the executive assistant director of the FBI’s national security branch from 2018 until he retired in January 2020. “It’s an example of the worst-case scenario if you don’t have complete supervision over where your devices are manufactured.”

China’s exploitation of products made by Supermicro, as the U.S. company is known, has been under federal scrutiny for much of the past decade, according to 14 former law enforcement and intelligence officials familiar with the matter. That included an FBI counterintelligence investigation that began around 2012, when agents started monitoring the communications of a small group of Supermicro workers, using warrants obtained under the Foreign Intelligence Surveillance Act, or FISA, according to five of the officials.

Whether that probe continues is unknown, as is a full account of its findings. But as recently as 2018, the FBI enlisted private-sector help in analyzing Supermicro equipment that contained added chips, according to an adviser to two security firms that did the work.

The Supermicro saga demonstrates a widespread risk in global supply chains, said Jay Tabb, a former senior FBI official who agreed to speak generally about China’s interference with the company’s products.

“Supermicro is the perfect illustration of how susceptible American companies are to potential nefarious tampering of any products they choose to have manufactured in China,” said Tabb, who was the executive assistant director of the FBI’s national security branch from 2018 until he retired in January 2020. “It’s an example of the worst-case scenario if you don’t have complete supervision over where your devices are manufactured.”



Supermicro spy chips, the sequel: It really, really happened, and with bad BIOS and more, insists Bloomberg



The article – a follow-on to BusinessWeek's 2018 spy chip bombshell – cites three specific incidents: the 2010 discovery by the Defense Department that thousands of its computers were sending military network data to China due to code hidden in chips that handle the server startup process; Intel's discovery in 2014 that a Chinese hacking group penetrated its network via a server that fetched malware from an unidentified supplier's update site; and a 2015 warning issued by the FBI to multiple companies that Chinese agents had hidden an extra chip with backdoored code on one manufacturer's servers.

In other words, Bloomberg has expanded its claim that chips containing malicious spyware were added to Supermicro server motherboards, to also include claims of malicious alterations to BIOS-level software to load and run surveillance code hidden in firmware, and to include alleged attacks on other vendors.
 

GURPS

INGSOC
PREMO Member

Biden Regime Raises Alarm on Suspected Chinese Malware in U.S. Power and Communication Networks that Can Disrupt Military Operations During Conflict



biden-kneel-xi-jinping-514x600.jpg



Members of Congress, state governors, and utility companies have been briefed by Biden administration officials on the findings. These officials have also confirmed some conclusions about the operation in interviews with The New York Times.

The malware has been described as a “ticking time bomb” by one congressional official. Its potential to give China the power to disrupt American military deployments or resupply operations by severing access to power, water, and communication lines to U.S. military bases is a chilling prospect. Moreover, because this infrastructure also serves homes and businesses of ordinary Americans, the potential impact could be even more far-reaching.

This elusive code, which the U.S. government has been trying to locate and eliminate, is more pervasive both within the United States and at American facilities abroad than initially realized. However, officials admit they are yet to fully understand the extent of the code’s infiltration, primarily due to its sophisticated concealment.

In response to questions from The Times, the White House released a statement on Friday that refrained from directly mentioning China or the military bases.

“The Biden administration is working relentlessly to defend the United States from any disruptions to our critical infrastructure, including by coordinating interagency efforts to protect water systems, pipelines, rail and aviation systems, among others,” said Adam R. Hodge, the acting spokesman for the National Security Council.

China’s embassy in Washington issued a statement on Saturday, denying its involvement in hacking and accusing the United States of being a far greater offender.
 

GURPS

INGSOC
PREMO Member

National Security Risk? 800% Surge in Illegal Chinese Migrants



Experts’ warnings of a possible covert Chinese Communist Party (CCP) invasion via the Biden border crisis seem increasingly relevant. There has reportedly been an 800% uptick in illegal Chinese migrants seeking to enter the U.S.

The Daily Caller reported on updated Border Patrol statistics August 18.

There were roughly 17,678 illegal migrant encounters of Chinese nationals between October 2022 and July, compared to 1,970 in all of fiscal year 2022, according to the data. In March, U.S. Customs and Border Protection (CBP) sent a memo exclusively obtained by the Daily Caller News Foundation to agency officials warning of a surge in Chinese migrants.


That previous memo asserted, “The loosened COVID protocols in China have allowed Chinese nationals to flee repressive rule in China and begin their journey to the United States seeking better living conditions.”

The CBP memo continued, “According to CBP, custodial interviews indicate that Chinese citizens are requesting asylum claiming religious persecution by the Chinese Government due to their Christian faith. Additionally, Chinese nationals reportedly make their own smuggling arrangements for most of their journey, only utilizing elements of smuggling networks to cross the border.”

If the migrants really are fleeing religious persecution, it’s understandable that we want to help them, although they still shouldn’t be allowed to cross our border illegally. (The Biden administration certainly hasn’t cared about helping Chinese Christian refugees before.) But there is a real risk that some or even many of these migrants are CCP plants.

I reported in April and June how a significant number of Chinese migrants are military-age males. An April Fox News video below provides a visual:


 

GURPS

INGSOC
PREMO Member

Michigan EV Plant's Chinese Backer Promotes Communist Propaganda


A China-based company behind the U.S. taxpayer-funded electric vehicle (EV) battery plant in Michigan has published reports showing some employees raising their fists pledging loyalty to the Chinese Communist Party (CCP) while others tour a museum wearing what looks like Red Army uniforms.

Gotion High-Tech, which is the China-based parent company of Gotion Inc. that is developing an EV battery plant near Big Rapids, recently published reports and video footage showing its staffers participating in pro-communist activities at an apparent work retreat.

Gotion Inc. secured a $1 billion taxpayer support for its factory near Big Rapids, at an overall cost of $2.4 billion, according to reports. Concerns about the deal have been raised by Michigan residents, Republicans, and environmental groups.

Records first reported by the Daily Caller National Foundation (DCNF) show that, during the summer of 2021, employees of Gotion High-Tech went on field trips to communist revolutionary memorials in China, donning Red Army outfits and pledging to "fight for communism to the end of my life."

“I volunteer to join the CCP, uphold the Party’s platform, observe the provisions of the Party’s by-laws, carry out a member’s duties, carry out the Party’s decisions, strictly observe the Party’s discipline, be loyal to the Party, work hard, to fight for communism as long as I live, be ready at all times to sacrifice everything for the Party and people and never betray the Party,” the employees chanted during a trip to China’s Revolutionary Memorial Hall in July 2021, according to footage translated by the Daily Caller National Foundation (DCNF).

A second trip took place a month later when the company took staff to Dabie Mountain in Anhui province, where they paid homage to the CCP's Long March, per the report. Employees during the second trip also wore Red Army uniforms and sang pro-communist songs.
 

GURPS

INGSOC
PREMO Member

Say, why are Chinese nationals trying to infiltrate military bases in the US?




Ho hum, nothing to see here. Just another instance in which the country that Joe Biden dismissed as a “competitor” wants an up-close look at America’s military installations, even more up-close than afforded to China’s giant spy balloon — the one that Biden let cross over the US before finally shooting it down.



According to the WSJ, however, their latest strategy is no one-off. As many as 100 instances or more of attempted intrusions by Chinese nationals have taken place “in recent years,” either by deceit or by stealth. While a handful of these are benign — Google Maps misdirections — others are far more worrisome:

Chinese nationals, sometimes posing as tourists, have accessed military bases and other sensitive sites in the U.S. as many as 100 times in recent years, according to U.S. officials, who describe the incidents as a potential espionage threat.
The Defense Department, FBI and other agencies held a review last year to try to limit these incidents, which involve people whom officials have dubbed gate-crashers because of their attempts—either by accident or intentionally—to get onto U.S. military bases and other installations without proper authorization. They range from Chinese nationals found crossing into a U.S. missile range in New Mexico to what appeared to be scuba divers swimming in murky waters near a U.S. government rocket-launch site in Florida. …
Officials described incidents in which Chinese nationals say they have a reservation at an on-base hotel. In a recent case, a group of Chinese nationals claiming they were tourists, tried to push past guards at Fort Wainwright, Alaska, saying they had reservations at a commercial hotel on the base. The base is home to the Army’s 11th Airborne Division, which is focused on Arctic warfare.
These cases at times occur in rural areas where officials indicate there is little tourism far from a commercial airport. The individuals use what appears to be scripted language when confronted by security guards, according to officials familiar with the tactics. When stopped, the Chinese nationals say they are tourists and have lost their way.

The idea, according to one expert, is to use relatively valueless pawns in large numbers to overwhelm US security. If they get stopped, they use that scripted language to claim error, and potentially deal with trespassing charges. If enough of them get through, however, China’s intelligence service can start collecting some serious data on the layout, security, and purposes of each military installation and sensitive national-security site.
 

GURPS

INGSOC
PREMO Member

US military bases fend off visits from Chinese citizens: reports




Government agencies like the Defense Department and the FBI held a review the past year to limit the events, the Journal reported. Officials allegedly call the people involved in the incidents “gate-crashers” and have espionage concerns about their occurrence. The gate-crashers have reportedly shown up in places like a U.S. missile range in New Mexico and a U.S. government rocket launch site in Florida.

A similar report about gate-crasher incidents in Alaska by USA Today was published in May. According to that report, one “incident” of attempted breach of Fort Wainwright in Fairbanks, Alaska, involved Chinese citizens who “blew past a security checkpoint.”

A drone was found in the vehicle of the visitors, who said they were lost tourists, USA Today reported.
 

GURPS

INGSOC
PREMO Member

US Website Hit With Cyberattacks After Releasing Testimony on CCP’s Forced Organ Harvesting


A New York-based research group became the target of malicious cyberattacks almost immediately after publishing testimony of a whistleblower doctor’s encounter with a Falun Gong practitioner who had her kidney removed against her will in China. The woman was a victim of the communist regime’s forced organ harvesting and perished not long after her conversation with the doctor, according to the whistleblower.

In April 2019, Zhang Xiuqin, 46, briefly survived an operation to remove one of her kidneys and relayed her experience to a doctor at a key military hospital in Harbin, the capital of China’s northernmost province Heilongjiang.

The whistleblower doctor, who is unnamed to protect her safety, provided a video recording of this conversation to the World Organization to Investigate the Persecution of Falun Gong (WOIPFG), a New York-based nonprofit dedicated to tracking the regime’s forced organ harvesting abuse. The organization published a transcript of the recording, as well as a transcript of the doctor’s testimony on July 17.
 

GURPS

INGSOC
PREMO Member

Congressional Hearing Sounds the Alarm on Chinese Communist Influence in K-12 Classrooms



A congressional hearing sounded the alarm about the Chinese Communist Party (CCP) using Mandarin language programs to spread communist ideology and grow its soft power in America’s K-12 classrooms.

Confucius Classrooms, the K-12 version of Confucius Institutes (CI) in universities, are language programs for which the CCP provides funding and controls curriculum and teacher vetting. In August 2020, the State Department designated the CI program’s D.C.-based headquarters as a “foreign mission” of China based on its “skewed Chinese language and cultural training for U.S. students as part of Beijing’s multifaceted propaganda efforts” and that the CI language programs were under guidance from the CCP’s United Front Work Department, the leading agency in charge of influence operations.

“[The CCP] are not paying for these books because they want us to learn,” Mike Gonzalez, a senior fellow at the Washington-based Heritage Foundation, said at the Tuesday hearing organized by the Subcommittee on Early Childhood, Elementary, and Secondary Education under the House Education Committee.
 

GURPS

INGSOC
PREMO Member
Ford announced on Monday that it is pausing construction on a multi-billion dollar battery plant in Marshall, Michigan that had drawn scrutiny from U.S. lawmakers over the company’s partnership with Chinese battery-maker Contemporary Amperex Technology Co. Ltd., or CATL.

[clip]

“While Ford has labeled this project a ‘commitment to American manufacturing’ and asserts it will create 2,500 new American jobs, we are concerned that Ford’s partnership with a Chinese company could aid China’s efforts to expand its control over United States electric vehicle supply chains and jeopardize national security by furthering dependence on China,” the letter said.

Republicans referenced congressional testimony that said CATL could stop working on the project if tensions between the U.S. and China escalated, leaving the vehicle maker in a bind over how to source batteries for its vehicles. The lawmakers also questioned who would be employed at the plant currently under construction in Marshall, Michigan.

“Additionally, Members learned at this hearing that Chinese companies often supply their own workers to projects in Latin America and Africa, reinforcing fears that CATL will import workers for this facility rather than creating jobs for United States workers,” the letter said.

The GOP lawmakers requested a copy of the licensing agreement between Ford and CATL, along with communications from Ford discussing federal incentives for the project.


“We seek to learn more about whether this partnership, and others like it, will potentially exacerbate our reliance on China. Should China gain control of domestic electric vehicle production, the United States would be exposed to serious national security risks at a time of escalating geopolitical tensions,” the Republicans said.



 

GURPS

INGSOC
PREMO Member
🔥 Politico ran a stomach-turning story yesterday headlined, “Chinese hackers nab 60,000 emails in State Department breach.

image 4.png

Super qualified Commerce Secretary Gina Raimondo said she has no idea how the Chinese got into all her secret emails.

According to newly-released information, the highly-competent diplomats at the State Department reluctantly admitted yesterday that the meddlesome agency accidentally gave its email and banking information to a displaced Chinese prince who needed some help getting ten million dollars out of the communist country. Apparently, he explained that the secret police were closing in, and he urgently needed to get his family’s fortune out, quick, and he was willing to let the State Department keep ten percent for the help.

Or something like that: “State Department officials said hackers broke into the 10 accounts using a token stolen from a Microsoft engineer.”

Uh huh.

I don’t mean to sound repetitive, but shut it down before things get worse. Please. I’m begging.





 

GURPS

INGSOC
PREMO Member

Backdoored firmware lets China state hackers control routers with “magic packets”



Hackers backed by the Chinese government are planting malware into routers that provides long-lasting and undetectable backdoor access to the networks of multinational companies in the US and Japan, governments in both countries said Wednesday.

The hacking group, tracked under names including BlackTech, Palmerworm, Temp.Overboard, Circuit Panda, and Radio Panda, has been operating since at least 2010, a joint advisory published by government entities in the US and Japan reported. The group has a history of targeting public organizations and private companies in the US and East Asia. The threat actor is somehow gaining administrator credentials to network devices used by subsidiaries and using that control to install malicious firmware that can be triggered with “magic packets” to perform specific tasks.

The hackers then use control of those devices to infiltrate networks of companies that have trusted relationships with the breached subsidiaries.

“Specifically, upon gaining an initial foothold into a target network and gaining administrator access to network edge devices, BlackTech cyber actors often modify the firmware to hide their activity across the edge devices to further maintain persistence in the network,” officials wrote in Wednesday’s advisory. “To extend their foothold across an organization, BlackTech actors target branch routers—typically smaller appliances used at remote branch offices to connect to a corporate headquarters—and then abuse the trusted relationship of the branch routers within the corporate network being targeted. BlackTech actors then use the compromised public-facing branch routers as part of their infrastructure for proxying traffic, blending in with corporate network traffic, and pivoting to other victims on the same corporate network.”
 

GURPS

INGSOC
PREMO Member

Behind a Secret Chinese Biolab in California, a Global Web of Connections



The discovery of a black market Chinese biolab operating in California, and the subsequent investigation into it, has exposed a tangled web of shell companies obscuring ownership and loopholes that caused delays in cleanup and informing the public.

The public found out in March about a secret biolab operating in a warehouse in Reedley, California, about 25 miles southeast of Fresno.

But the warehouse and its biological hazards were discovered months earlier, on Dec. 19, 2022, by Jesalyn Harper, a code enforcement officer with the City of Reedley Fire Department.

Responding to an anonymous tip about the supposedly vacant warehouse, Ms. Harper discovered thousands of vials of bacterial and viral agents, including coronavirus, chlamydia, E. coli, streptococcus pneumonia, HIV, hepatitis, herpes, rubella, and malaria.

The business, operated by Prestige Biotech Inc., was also packaging and mailing out COVID-19 and pregnancy test kits, as well as housing nearly 1,000 lab mice.

A map illustration shows the location of the biolab in Reedley, Calif. (Illustration by The Epoch Times, Nathan Su/The Epoch Times, Shutterstock)


A map illustration shows the location of the biolab in Reedley, Calif. (Illustration by The Epoch Times, Nathan Su/The Epoch Times, Shutterstock)


Ms. Harper reported her findings to the City of Reedley, which contacted the FBI on the same day. But there was no single authority that could deal with all of the pathogens, chemicals, and biological hazards.

Eventually, a maze of agencies got involved in the investigation and cleanup, including city, county, and state authorities, as well as federal agencies such as the FBI, the Centers for Disease Control and Prevention (CDC), the Environmental Protection Agency (EPA), and the Food and Drug Administration (FDA).
 

GURPS

INGSOC
PREMO Member
The latest incident followed a bombshell report from earlier this year that found more than 100 incidents have occurred where Chinese nationals posed as tourists to test the security of military bases as well as other sensitive sites.

“We’ve seen many, many Chinese nationals, saying they’re tourists and stuff, and they’ve been photographing sensitive installations,” Giminez told the outlet, adding the individuals have targeted critical U.S. infrastructure to “see how that can be compromised.”

One case involved Chinese nationals who said they were tourists attempting to force their way past guards at the military base in Fort Wainwright, Alaska, the home to the Army’s 11th Airborne Division. Chinese nationals have reportedly repeatedly photographed the White Sands Missile Range in New Mexico, the largest overland military test range in the U.S.

Chinese nationals were reportedly found swimming near a Key West, Florida, military facility. They claimed they were tourists. Other Chinese nationals seemed to be scuba diving near Cape Canaveral, where spy satellites are sent into space, according to the Journal.

Giminez blamed the potential national security threat on the Biden administration’s open border policies, which have led to record-breaking illegal immigrant encounters since President Joe Biden took office in 2021 — an estimated 6.5 million just in the three fiscal years alone.




 

GURPS

INGSOC
PREMO Member

Hayward: Coward Xi Jinping Ducks U.S. Journalists for Swanky Dinner with Fawning CEOs



Every moment of Xi’s trip to San Francisco was tightly scripted, so the dictator was not about to let reporters take pot shots at him. After his meeting with Biden, Xi dashed over to a dinner with business executives, hosted by the U.S. China Business Council and National Committee on U.S.-China Relations.

The guest list included Apple CEO Tim Cook, Elon Musk of Tesla and X, Steve Schwarzman of Blackstone, Larry Fink of BlackRock, and executives from major companies from Boeing to Pfizer. Several members of the Biden administration were present, including Secretary of Commerce Gina Raimondo, and Xi brought some of his own top officials as well.

Xi’s keynote address pointedly refuted some of President Biden’s language on China, urging his audience of American tycoons to view Xi’s genocidal regime as a “partner” instead of a “competitor” or security threat.

Xi made some efforts to woo back Western investors who have grown nervous about doing business in China since the Wuhan coronavirus pandemic, including pledges that China only wants peace and stability.

Inquisitive journalists might have asked Xi some follow-up questions, such as why peace-loving China is ramming into Philippine ships in the South China Sea, but there was no indication that any of the assembled CEOs posed any such awkward queries. The American business executives gave Xi no less than three standing ovations before and after his speech.
 

GURPS

INGSOC
PREMO Member

Government Flubs Enabled China Disease Lab in California




The apparent illegal migrant ringleader was finally arrested in October and charged with fraud crimes, long after he fled from a Canadian court in 2016, and long after he began reportedly selling fraudulent medical products to Americans.

“A disturbing realization is that no one knows whether there are other unknown biolabs in the United States,” said the bipartisan, 42-page report, dubbed “The Reedley Report.”

The federal government rarely tries to learn from its failures, and there is little evidence that the Department of Homeland Security, the Centers for Disease Control and Prevention (CDC), the FBI, or the Federal Trade Commission, are investigating their multi-agency failure. California’s state government also failed to detect the operation until a city inspector in Reedly, CA, discovered an improper water release.

In 2021, Biden’s deputies quickly ended border protections created by former President Donald Trump and then curbed his successful FBI investigations of Chinese spying.

Without federal attention, the investigation was taken up by the House Select Committee on the Chinese Communist Party. The committee is chaired by Rep. Mike Gallagher (R-WI) and was aided by Rep. Jim Costa (D-CA), who pressured the CDC to begin investigating the unsupervised disease laboratory.

The lab, according to the report, was likely a cover for fraud and government-aided economic espionage by a Chinese citizen, Jiabei “Jesse” Zhu.

In 2016, the Canadian government levied a huge fine of more than $330 million for a decade’s worth of intellectual property economic theft in Canada, said the report, which continued:

Zhu appears to have entered the United States unlawfully, given that he was subject to a Canadian arrest warrant. While in United States, he began to operate under the false identity of “David He.”
 

Kyle

ULTRA-F###ING-MAGA!
PREMO Member
'We Cannot Be Associated With Elon Musk,' Says Tim Cook While Shaking Hands With Brutal Chinese Dictator

SAN FRANCISCO, CA — Amid charges that Elon Musk's social media app "X" has become a dangerous breeding ground for speech Communists don't like, Apple CEO Tim Cook has elected to pull all Apple advertising from the platform.

"I refuse to allow my morally pristine corporation to be associated with disreputable characters like Elon Musk," said Cook while shaking the hand of murderous communist dictator Xi Jinping at this week's APEC Dinner. "Plus, the ADL, ACLU, and WEF told me I had to pull my ads or they'd break the story about what I did on Epstein Island. We can't have that."


 
Top