Read
- Egypt's Mursi rebuffs army ultimatum, sets own course
|
- Snowden threatens new U.S. leaks, asks numerous countries for asylum
- Taliban attack on supply base in Afghan capital kills six
- World shares rise, Europe dips on mixed growth outlook
- Documents show Milwaukee archdiocese shielded pedophile priests
Reuters Photojournalism
Our day's top images, in-depth photo essays and offbeat slices of life. See the best of Reuters photography. See more | Photo caption
Gettysburg's 150th
Re-enactors and visitors mark the 150th anniversary of the Battle of Gettysburg, often described as the turning point of the Civil War. Slideshow
Gay pride parades
Revelers celebrate in gay pride parades around the world, on the heels of twin victories on same-sex marriage in the U.S. Supreme Court. Slideshow
Sponsored Links
U.S. to press China on cyber theft: Lew
ASPEN |
ASPEN (Reuters) - U.S. Treasury Secretary Jack Lew has said he will keep up pressure on China over cyber security, especially stealing of intellectual property and trade secrets, which he sees as separate from other Internet-related issues between the two countries.
The recently appointed Treasury secretary said on Sunday he had already raised his concerns on cyber security when he met with Chinese President Xi Jinping in China recently.
"It is fundamentally a different set of issues and is something that is going to remain high on our agenda of issues to talk to with them about," he told an audience at the Aspen Ideas festival, saying the meetings in China were "productive."
Lew and Secretary of State John Kerry are set to host their Chinese counterparts in Washington DC next week for the annual U.S.-China Strategic and Economic Dialogue.
Computer hacking is a contentious issue between the two countries. U.S. intelligence leaders have said that cyber attacks and cyber espionage had supplanted terrorism as the top security threat facing the United States.
For its part, China accused U.S. recently of "double standards" in cyber security after the flight from Hong Kong of fugitive former spy agency contractor Edward Snowden, who leaked details of U.S. cyber surveillance tactics.
While not directly referring to the Snowden issue, Lew said cyber theft "is just different from other kinds of issues in the cyber area".
Lew said he also used the recent visit to Beijing to try and convince the new Chinese administration to reduce barriers to trade and open up the country to wider foreign investment.
U.S. companies face barriers to invest in around 100 Chinese sectors, while China holds that U.S. bars Chinese investments on unjustified national security grounds.
"They fundamentally have to move from a place where they have a very rigid, structured support for all the industries and go to more market-determined interest rates, market-determined investment policies, opening their market more to international investment," Lew said.
"The fact that there are other issues that do come up between us can't become an issue as we talk about the core economic issues which are frankly things China needs to do in order to grow its economy," he added.
(Reporting By Poornima Gupta; Editing by Alistair Lyon)
- Tweet this
- Link this
- Share this
- Digg this
- Reprints
“At some point in time shortly after 9/11, and by methods not addressed here, these individuals improperly utilized access to, and devices of, the lawful operations of the Joint Terrorism Task Force (the “JTTF”). These individuals completely violated the provisions of FISA, ECPA and the Patriot Act for their own personal and political agendas. Specifically, these NY state employees essentially commenced “black bag operations,” including illegal wiretapping, against whomever they chose- and without legitimate or lawful purpose.” – http://exposecorruptcourts.blogspot.no/2013/04/formal-complaint-filed-against-nys.html
“The wire-tapping and ISP capture, etc., of DDC attorney, Christine C. Anderson, who had filed a
lawsuit after being assaulted by a supervisor, Sherry Cohen, and after complaining that certain
evidence in ethics case files had been improperly destroyed. (See SDNY case #07cv9599 – Hon.
Shira A. Scheindlin, U.S.D.J.)” Source: http://ethicsgate.blogspot.in/2013/05/phone-record-grab-started-before-obama.html
https://secure.avaaz.org/en/stop_prism_global
This is significant, as the motions attached herein show that Barack Obama is using a stolen Social Security number of Harrison J. Bounel, born in 1890, immigrant from Russia, who is presumed to be deceased.
At the time the case was originally filed and heard, the plaintiffs did not have new information that became available recently. Such information includes recently released census data which shows Harrison J. Bounel being born in 1890, recent disclosure to the public of the 120 year SSA rule, which requires release of SS-5, Social Security original application of “extremely aged individuals”, meaning individuals of 120 years old or older without a consent of such individual and without a death certificate or any other proof of death, as well as recent report from Merlins Information Systems showing Barack Obama using both Bounel’s name and Social Security number in connection to his property at 5046 Greenwood in Chicago as late as 2009.”
http://redflagnews.com/headlines/alert-chief-judge-of-the-united-states-district-court-for-dc-gives-leave-of-court-to-file-motions-documents-providing-undeniable-evidence-of-obamas-use-of-a-stolen-social-security-number



Follow Reuters