Anonymous ID: 5b27eb April 4, 2019, 8:53 a.m. No.6045244   🗄️.is 🔗kun   >>5256 >>5350

Mar-A-Lago Chinese Spy Friend "Charles"

 

Lee is the founder of the United Nations Chinese Friendship Association, a for-profit Delaware-based company that is not listed by the United Nations as an affiliated organization. Instead, Lee uses the company to advertise Yang’s Mar-a-Lago invites to Chinese clients hoping to get close to Trump. The name of the company is almost identical to the event Zhang said she wished to attend.

 

The group’s website promoted the Chinese Communist Party, and promoted President Xi Jinping’s business diplomacy agenda — an effort to send Chinese business leaders abroad to befriend politicians in hopes of gaining favor for China and its agenda.

 

Since Yang first set foot in Mar-a-Lago in late 2017, she and Lee have brought more than two dozen guests to various Mar-a-Lago events. Yang provided housing for one of Lee’s guests who attended a New Year’s Eve party on Dec. 31, 2018, according to a report by The New York Times. The guest, a Chinese actress named Sun Ye, took photos with two of the president’s sons, Donald Jr. and Eric Trump.

 

Lee could not be reached for comment and appears to have disconnected his phone and taken down the group’s website after being contacted by a Herald reporter last week. In a brief conversation at the time, Lee denied knowing Yang before hanging up.

 

https://www.miamiherald.com/news/politics-government/article228783369.html

Anonymous ID: 5b27eb April 4, 2019, 8:56 a.m. No.6045273   🗄️.is 🔗kun   >>5308

>>6045268

The National Security Agency released the source code of Ghidra, its reverse engineering tool, April 4.

 

This source code repository includes instructions to build on all supported platforms (macOS, Linux, and Windows). With this release, developers will be able to collaborate by creating patches, and extending the tool to fit their cybersecurity needs.

 

The source code is available for download at ghidra-sre.org along with the 9.0.2 patch.

 

Ghidra is a software reverse engineering (SRE) framework developed by NSA's Research Directorate for NSA's cybersecurity mission. It helps analyze malicious code and malware like viruses, and can give cybersecurity professionals a better understanding of potential vulnerabilities in their networks and systems.

 

We look forward to ideas and contributions from the community!

 

For more NSA releases, check out CODE.NSA.GOV for open source, and NSA’s Technology Transfer Program for other technology.