Russia and China Are Using Hacked Data to Identify and Neutralize U.S. Agents

As was predicted, the U.S. intelligence community has been fully compromised. Hopefully not, but it might only be a matter of time before we — like the dead bankers and ongoing U.S. military purge — start seeing a list of dead U.S. agents piling up.

 

This is one of the great scandals of the Obama administration–really, of the post-war era. But our Democratic Party media, fearful of what may be coming in next year’s presidential election, have consistently downplayed it. The Los Angeles Times reports: “Foreign spies use hacked data to identify U.S. intelligence agents.”

Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.

At least one clandestine network of U.S. engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result, according to two U.S. officials.

Continue reading

The biggest heist of secret US personnel data in cyber history is still ongoing

As was mentioned just the other day, all U.S. intelligence agencies have been compromised in addition to all other government entities that were attacked.

 

The White House has admitted that systems containing deeply personal information, submitted by current, former and prospective federal government employees for security clearances, had been “exfiltrated.” If the breach of the Office of Personnel Management (OPM) was conducted by hackers linked to China, as suspected, access to the Standard Form 86 submitted by an estimated 41 million federal employees provided them with what may be the world’s largest stolen data base of US intelligence and military personnel.

This is a “gold mine” of unencrypted data that leave US intelligence officers, for example, open to blackmail or coerced recruitment.

While officials speak of two hacks, debkafile’s cyber security and intelligence experts report that it was a single breach and is still ongoing. Known to experts as an “Advanced Persistent Threat,” it amounts to slow, continuous penetration by a computer virus, planted in an individual computer of a network which duplicates itself gradually and insidiously. Continue reading