SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: THE WATSONYOUTH who wrote (883926)9/1/2015 8:08:40 AM
From: FJB   of 1575615
 
Russia and China Are Using Hacked Data to Identify and Neutralize U.S. Agents
Posted on August 31, 2015 by John Hinderaker

This is one of the great scandals of the Obama administration–really, of the post-war era. But our Democratic Party media, fearful of what may be coming in next year’s presidential election, have consistently downplayed it. The Los Angeles Times reports: “Foreign spies use hacked data to identify U.S. intelligence agents.”

Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.

At least one clandestine network of U.S. engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result, according to two U.S. officials.

And yet, as best we can tell, the Obama administration has done nothing to retaliate, even though our own technical capacities are, if we ever were to use them, far greater.

The Obama administration has scrambled to boost cyberdefenses for federal agencies and crucial infrastructure as foreign-based attacks have penetrated government websites and e-mail systems, social media accounts and, most important, vast data troves containing Social Security numbers, financial information, medical records and other personal data on ­millions of Americans.

Counterintelligence officials say their adversaries combine those immense data files and then employ sophisticated software to try to isolate disparate clues that can be used to identify and track — or worse, blackmail and recruit — U.S. intelligence operatives.

This is a very big problem. Is Barack Obama concerned about it? Or is his attention devoted entirely to fomenting race hatred in the United States? National security is, apparently, the least of his concerns.

Asked whether adversaries had used this information against U.S. operatives, [William Evanina, a top U.S. counterintelligence official] said, “absolutely.”

U.S. officials, speaking on condition of anonymity, say China and Russia are collecting and scrutinizing sensitive U.S. computer files for counterintelligence purposes.

Russia and China have repeatedly carried out acts of war against the United States, perhaps emboldened by the knowledge that our administration doesn’t like America any better than they do. Don’t forget Russia’s attack on the State Department’s and White House’s computer systems, which we reported on over and over, but which liberal media buried because the story broke just before the 2014 election, when the Democratic Party was already in deep trouble. As we reported at the time, the Obama administration never did notice that the White House’s own computers, and the State Department’s, had been infiltrated by a foreign power. They shut down White House and State Department computers only because they were alerted to the Russian attack by an ally, most likely Israel.

It seems obvious that neither the Obama administration nor our liberal media have much interest in the national security implications of Russia’s and China’s cyberattacks, and are happy to sweep this latest threat to our security under the rug. One might well wonder why.

81SHARES ×81SHARES
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext