
ND Senate fails bill to divest Legacy Fund from China
Apr. 16—BISMARCK — The North Dakota Senate failed a bill on a 20-26 vote Tuesday, April 15, that would have allowed the State Investment Board to divest Legacy Fund investments from Chinese companies.
Sens. Cole Conley and Terry Wanzek, both R-Jamestown, voted in favor of House Bill 1330.
HB 1330 would have added language to the prudent investor rule to define a Chinese company as a company domiciled in China.
Sen. Sean Cleary, R-Bismarck, a supporter of the bill, said HB 1330 allows but does not require the State Investment Board to divest Legacy Fund holdings from Chinese companies.
"I think there's circumstances where it's appropriate for the SIB (State Investment Board) to take a look at all the factors that are surrounding where our Legacy Fund is invested and make a decision based on those factors," he said. "I think a green vote on this bill positions them to do that. It gives them the flexibility to divest from direct investments in China."
Sen. Cole Conley, R-Jamestown, a sponsor of the bill, said the Legacy Fund is being used to invest in China's sovereign wealth fund.
"I'm not sure why we are doing that," he said.
Sen. Jeffery Magrum, R-Hazelton, said the state could lose money on its Legacy Fund investments in Chinese companies if the U.S. goes to war with China.
"I think divesting would have been great, but if the state investment board has the option to say, we need to pull the plug on our investments over there, it does give them the option," he said.
In 2010, North Dakota voters approved a measure that created the Legacy Fund, which is a perpetual source of state revenue from the finite national resources of oil and natural gas, according to the Office of State Treasurer's website. Thirty percent of the taxes on petroleum produced and extracted in North Dakota are transferred to the Legacy Fund monthly, according to the North Dakota Retirement and Investment Office's website.
The Legacy Fund has over $12 billion as of Jan. 31. It has earned over $600 million for the 2023-25 biennium.
The State Investment Board has statutory responsibility for the administration of the investment programs of several funds including the Legacy Fund, according to the Retirement and Investment Office's website.
Sen. Michael Dwyer, R-Bismarck, who opposed the bill, said about $22 million of the Legacy Fund is in direct holdings in Chinese companies.
"The State Investment Board operates under a prudent investment rule and there might be one of those investments that is an excellent investment," he said. "They would need the authority to divest themselves from that if they were going to violate the prudent investor rule."
Sen. Jerry Klein, R-Fessenden, who opposed the bill, said it would be the first time a specific nation was listed in the North Dakota Century Code if the bill were to pass.
"We've got investments around the country, and the federal government allows us to invest there," he said. "They have a list of countries where we can't invest, so that provides some of that comfort that we were looking for."
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Los Angeles Times
an hour ago
- Los Angeles Times
Feds vow to continue immigration enforcement ‘every day in L.A.' Here are your rights
As the number of immigration raids has increased across Southern California over the last week, there are more questions than ever about how to handle an interaction with federal agents. Agents with Immigration and Customs Enforcement made arrests in the Garment District, specifically at Ambiance Apparel, where immigration authorities detained employees inside the clothing wholesaler, and other locations on Friday. Protests followed into the weekend, prompting the deployment of National Guard troops in downtown Los Angeles by the Trump administration. The raids are the latest in a string of high-profile immigration enforcement actions over the last week, part of President Trump's promised deportation crackdown. A few days ago, immigration agents raided a popular San Diego restaurant and made arrests, sparking a standoff with outraged residents. Agents also arrested Chinese and Taiwanese nationals at an underground nightclub in the Los Angeles area. Officials suggest many more raids are coming. 'I'm telling you what, we're going to keep enforcing law every day in L.A.,' Trum's 'border czar,' Tom Homan, told NBC News. 'Every day in L.A., we're going to enforce immigration law. I don't care if they like it or not.' Officials have not said how long the raids will last or described the larger operation. But in the deployment memo sending the National Guard to L.A., officials said 'the duration of duty shall be for 60 days or at the discretion of the Secretary of Defense. In addition, the Secretary of Defense may employ any other members of the regular Armed Forces as necessary to augment and support the protection of Federal functions and property in any number determined appropriate in his discretion.' Over the last few months, The Times has asked experts for guidance for employees and employers who find themselves in the cross-hairs. Here is a summary of what we found: If you're home alone or with family members and you hear a knock at the door, check the window, security camera or peephole so you can identify whether ICE agents are outside. When you find yourself in this situation, the first step is to keep your door closed and locked, advised advocacy groups and legal experts. You must open your door and allow agents inside your home if they present a valid search warrant. Advocates say agents must identify themselves and show you the warrant by putting it against the window or slipping it under your door. A valid warrant must be: This can be an overwhelming and scary situation. All those emotions are valid, said Pedro Trujillo, director of organizing for the Coalition for Humane Immigrant Rights. Take a moment to gather yourself, he suggests, because there isn't a time limit on the visit. If you need help verbalizing your rights, show the agent a Red Card that helps explain your rights. Red Cards can be downloaded from the website for the Immigration Legal Resource Center. By showing this card, you're affirming that you want to remain silent and wish to speak to a lawyer. The card states that the person ICE agents are inquiring about has the right to decline answering questions and signing or handing over documents based on their 5th Amendment rights under the U.S. Constitution. You can present this card to agents, whether it's a physical copy or a photo on your phone, by displaying it through the window. If ICE agents enter your home without consent, you have the right to say: 'I do not consent to this entry or search,' according to advocates. Don't physically resist. Instead, you have the right to document what happens, including: After agents have left, you have the right to reach out to and consult with a legal representative. You have the right to remain silent. For example, if you're asked about your immigration status, where you were born or how you entered the United States, you may refuse to answer or remain silent, according to the National Immigration Law Center. You can simply say, 'I want to remain silent' or 'I am exercising my right to remain silent.' Experts advise that you are not required to sign documents or provide personal information. If ICE agents are present when you're on public transportation: If ICE agents approach you while you're in the car: If you are detained or taken into custody, you have the right to reach out to an attorney and receive a phone call from an attorney. You can prove you have a lawyer by giving the officer your signed Form G-28, a federal document that details your lawyer's information and your consent to their legal representation. Don't have a lawyer? You can ask the ICE official for a list of pro-bono lawyers. You can also ask to contact the consulate, which may be able to assist you in finding a lawyer. Get familiar with the rules of the detention center you've been placed in. You can do so by asking for a copy of the Detainee Handbook to understand the detention center's rules, your rights and how you can communicate with loved ones. The book is available in 19 languages, including English, Spanish, Arabic, Bengali, French, Haitian Creole, Hindi, K'iche' (Quiché)/Kxlantzij, Mam, Portuguese, Pulaar, Punjabi, Q'eqchi' (Kekchí), Romanian, Russian, Simplified Chinese, Turkish, Vietnamese and Wolof. A raid is when ICE agents arrive at a work site without warning the employer. They can be accompanied by other agencies or appear in large numbers, according to the California Employers Assn. ICE agents can go to a business to try to find a particular person, or people, according to the National Immigration Law Center. The California Employers Assn. recommends creating a four-step response plan that should address the following: Who should be alerted: Alerting management and employee/union representatives within an organization can help reduce workplace disruption and keep employees calm, said Giuliana Gabriel, vice president of human resources at the California Employers Assn. 'Rumors and misinformation tend to create panic amongst a workforce, and some employees may even try to flee or confront agents,' she said. 'Running could give the agents reason to detain or arrest someone, so having an employee representative or member of management to maintain order and keep employees calm is advisable.' Legal counsel should immediately be notified when ICE shows up because they can help 'protect your organization and your employees from agents overstepping their boundaries or taking liberties as far as what they are authorized to do at your workplace,' she added. Authorized speakers: Examples of people who can be designated to speak with agents include the business owner or a member of the management team, such as a general manager or human resources representative. 'Ideally it would be someone familiar with your response plan, if you have one, and authorized to speak on behalf of the company,' Gabriel said. The identified person or people should be able to communicate confidently, clearly and remain composed 'while protecting the privacy of your organization and its employees,' she said. Gathering ICE agent information: You have the right to ask immigration officials which agency they represent as well as for their names, badge numbers and business cards. 'There have been reports of citizens impersonating ICE agents to target, detain and harass others,' Gabriel said. Designated waiting area: Find a conference room or office where agents can wait. This can limit workplace disruptions. Businesses should enact their response plan immediately when immigration officials arrive. Before ICE agents can enter private areas of your business (public areas are parking lots or lobbies), they must present a valid warrant to conduct their search. As when a warrant is presented at a private home, at the workplace a valid warrant must be issued by a court, have the correct name and address of the person being seized and be signed by a judge or magistrate judge. Businesses should ensure that employees know their rights and that they should refrain from engaging with ICE officials, according to the National Employment Law Project. If ICE agents have questions or requests, workers should not respond and instead direct the officials to speak with their employer.


New York Post
an hour ago
- New York Post
US-China trade talks to open in London as new disputes emerge
US-China trade talks in London this week are expected to take up a series of fresh disputes that have buffeted relations, threatening a fragile truce over tariffs. Both sides agreed in Geneva last month to a 90-day suspension of most of the 100%-plus tariffs they had imposed on each other in an escalating trade war that had sparked fears of recession. Since then, the US and China have exchanged angry words over advanced semiconductors that power artificial intelligence, 'rare earths' that are vital to carmakers and other industries, and visas for Chinese students at American universities. Advertisement 3 President Trump spoke at length with Chinese leader Xi Jinping by phone last Thursday in an attempt to put relations back on track. REUTERS President Trump spoke at length with Chinese leader Xi Jinping by phone last Thursday in an attempt to put relations back on track. Trump announced on social media the next day that trade talks would be held on Monday in London. The latest frictions began just a day after the May 12 announcement of the Geneva agreement to 'pause' tariffs for 90 days. Advertisement The US Commerce Department issued guidance saying the use of Ascend AI chips from Huawei, a leading Chinese tech company, could violate US export controls. That's because the chips were likely developed with American technology despite restrictions on its export to China, the guidance said. The Chinese government wasn't pleased. One of its biggest beefs in recent years has been over US moves to limit the access of Chinese companies to technology, and in particular to equipment and processes needed to produce the most advanced semiconductors. 'The Chinese side urges the US side to immediately correct its erroneous practices,' a Commerce Ministry spokesperson said. US Commerce Secretary Howard Lutnick wasn't in Geneva but will join the talks in London. Analysts say that suggests at least a willingness on the US side to hear out China's concerns on export controls. Advertisement 3 US Commerce Secretary Howard Lutnick will take part in the talks in London. One area where China holds the upper hand is in the mining and processing of rare earths. They are crucial for not only autos but also a range of other products from robots to military equipment. The Chinese government started requiring producers to obtain a license to export seven rare earth elements in April. Resulting shortages sent automakers worldwide into a tizzy. As stockpiles ran down, some worried they would have to halt production. Trump, without mentioning rare earths specifically, took to social media to attack China. Advertisement 'The bad news is that China, perhaps not surprisingly to some, HAS TOTALLY VIOLATED ITS AGREEMENT WITH US,' Trump posted on May 30. 3 China dominates the mining and processing of rare earth minerals. REUTERS The Chinese government indicated Saturday that it is addressing the concerns, which have come from European companies as well. A Commerce Ministry statement said it had granted some approvals and 'will continue to strengthen the approval of applications that comply with regulations.' The scramble to resolve the rare earth issue shows that China has a strong card to play if it wants to strike back against tariffs or other measures. Student visas don't normally figure in trade talks, but a US announcement that it would begin revoking the visas of some Chinese students has emerged as another thorn in the relationship. China's Commerce Ministry raised the issue when asked last week about the accusation that it had violated the consensus reached in Geneva. It replied that the US had undermined the agreement by issuing export control guidelines for AI chips, stopping the sale of chip design software to China and saying it would revoke Chinese student visas.


Boston Globe
2 hours ago
- Boston Globe
Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'
Foreign hackers have increasingly identified smartphones, other mobile devices, and the apps they use as a weak link in US cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. Get Starting Point A guide through the most important stories of the morning, delivered Monday through Friday. Enter Email Sign Up It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. Advertisement 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity specialist at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' US authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real-time and able to read text messages,' said Representative Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Advertisement Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. US intelligence officials have said China poses a significant, persistent threat to US economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' US Representative John Moolenaar, Republican of Michigan and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their US operations. Advertisement Mobile devices can buy stocks, launch drones, and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords, and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators, and business leaders with texts and phone calls. It's unclear how the person obtained Wiles's connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles's number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information, or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Advertisement Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. 'We just can't share things willy-nilly.'