Anonymous ID: 83eb71 March 19, 2020, 9:45 p.m. No.8484801   🗄️.is đź”—kun   >>4836 >>4894

>>8484743

 

A blog had a chronological history of Hunter Biden and Hennibes with the followind details and links:

 

2015

 

AVIC buys 51% of a technology known as Henniges, Biden and Kerry’s BHR fund purchases the remaining 49%.

 

Source https://www.prnewswire.com/news-releases/bhr-and-avic-auto-acquire-henniges-automotive-300143072.html (Sept 15, 2015)

 

Henniges was an anti-vibration technology considered a dual use because it’s used in on military vehicles..like an F-35.

 

This technology was on the restricted commerce list so it would be require the approval from the committee of foreign investments of the united states for it to be released..the person in responsible for that decision? John Kerry, the secretary of state, and the stepfather of Chris Heinz who’s BHR fund bought 49%.

 

His state department approved the deal the same year.

 

Source (book "Secret Empires”) https://books.google.com/books?id=jhB5DwAAQBAJ&pg=PT13&lpg=PT13&dq=BHR+49%25+henniges&source=bl&ots=_9homT8Dwg&sig=ACfU3U0rG3hdCrKJz8R63V49KGMTt_6Nuw&hl=en&sa=X&ved=2ahUKEwiA27H6-vPkAhUBRa0KHTxCCpgQ6AEwA3oECAoQAQ#v=onepage&q=BHR%2049%25%20henniges&f=false

 

BHR then teams up with a Beijing company this time to buy 100% of a rare earth material called molybdenum. 4 years earlier, the US had filed a complaint to the world trade organization charging Beijing with attempting to control the worlds rare-earth minerals, the WTO ruled in the US’s favor.

 

Source https://www.reuters.com/article/us-cmoc-congomining-bhr-idUSKCN1PC1GN (Jan 18, 2019)

Anonymous ID: 83eb71 March 19, 2020, 10:02 p.m. No.8484939   🗄️.is đź”—kun

>>8484836

>>8484900

 

Article on AVIC hacking Australian Defense and stealing F-35 fighter docs in November 2016.

 

The blog summary:

Meanwhile back in China, a company named AVIC (aviation industry of china) has been secretly stealing US technologies related to a F-35 stealth fighter jets..AVIC also teams up with a fund known as BHR, the same BHR fund that is owned by Biden and Kerry’s sons and had secured $1.5 billion from the chinese goverment.

 

Article:

Hackers Stole Restricted F-35 Data From an Australian Contractor

(fortune magazine Oct 14 2017)

https://fortune.com/2017/10/14/hacked-f-35-data/amp/

 

The attackers left signs they may have been Chinese.

 

Australian and U.S. officials confirmed this week that an unnamed Australian defense firm involved in developing the F-35 fighter jet was hacked in November of 2016. The attackers, who may have been Chinese, stole large amounts of data on the F-35 and other vehicles and munitions.

 

A spokesman for the F-35 program told Defense News that the breach did not compromise any classified data. However, the data has been described by Australian authorities as commercially sensitive, and as including detailed schematics.

 

According to ZDNet, which first spotted the revelations in an Australian government report, the compromised data was restricted under the International Traffic in Arms Regulation, which controls the export of military technology from the U.S.

 

Australian officials have not identified a culprit, but the attack was carried out, in part, using a hacking tool known as “China Chopper.” According to Ars Technica, the tool has been used extensively by Chinese hackers in the past.

 

The theft of defense schematics by the Chinese government or allied forces would fit a disturbing pattern. According to documents released by NSA whistleblower Edward Snowden in 2015, Chinese hackers have already compromised top secret data on the F-35. Experts allege that information has informed the design of Chinese fighter jets including the Chengdu J-20 and the Shenyang J-31 Falcon Hawk.

 

Those planes’ designers, Chengdu Aircraft Industry Group and Shenyang Aircraft Corporation, are subsidiaries of the Aviation Industry Corporation of China, or AVIC, a state-owned enterprise.

 

According to ZDNet, the hackers faced few challenges in accessing the Australian defense contractor’s system. The company was small, with a one-person IT department and lackluster security measures. The attacker reportedly had access to the company’s network for at least three months.