Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

CIA China Ops Wiped Out By 'Botched' Spy Contact System
Conservative Daily Post ^ | 18 Aug 2018 | Mark Megahan

Posted on 08/18/2018 5:10:30 PM PDT by UMCRevMom@aol.com

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-31 last
To: UMCRevMom@aol.com

Not that complicated. It’s what you get when the Oval Office occupant and the director of the central blankety blank agency both hate America.


21 posted on 08/18/2018 8:38:08 PM PDT by reasonisfaith ("...because they received not the love of the truth, that they might be saved." (2 Thessalonians))
[ Post Reply | Private Reply | To 1 | View Replies]

To: UMCRevMom@aol.com

Anyone venturing to China is stupid. That police state will take all your biometric and they can track you outside country, especially if ethnic Chinese. They own you.


22 posted on 08/18/2018 8:55:13 PM PDT by JudgemAll (Democrats Fed. job-security Whorocracy & hate:hypocrites must be gay like us or be tested/crucified)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tennmountainman

I bet Feinsteins office is responible for some premature organ harvesting on some of our citizens, too.


23 posted on 08/18/2018 10:11:45 PM PDT by Karl Spooner
[ Post Reply | Private Reply | To 7 | View Replies]

To: Zhang Fei; palmer
Either double agent Lee gave the Chinese access to the communications platform, which he got from his handler or the Chinese may have identified another agent and accessed that person’s computer.

The interim system may have been detected simply through routine pattern analysis of the internet data.

Too many “mays’ and “maybes”.

The KISS answer is that Chinese security have the best hackers, and were able to find these “breadcrumbs” through Hillary and ALL other “private” servers running around DC.

It sure is strange that multiple high level government officials, ALL with TS or SCI designations, and all within the Obama administration, were set up so close together and emailed each other so often.

There is a reason that American security used to be strong, and is now not strong - elite privileges allows to the Pigs More Equal.

24 posted on 08/19/2018 7:07:38 AM PDT by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: texas booster
The KISS answer is that Chinese security have the best hackers, and were able to find these “breadcrumbs” through Hillary and ALL other “private” servers running around DC.

How is that KISS? Are you saying they hacked into Hillary's server, read emails with names of agents, and rounded them up? That's not KISS and there's no evidence for names like that being in any of the emails.

Here's KISS: some crappy CIA software connected clients back to a "secret" proxy somewhere. The Chinese figured out that the proxy belonged to the CIA, which can be leaked (KISS) or figured out (not quite as simple but doable). Then anybody connecting to that proxy would be rounded up. Sometimes that would require arresting everyone at the internet cafe and going through all of the computers, but that's easy for Chinese Communists..

25 posted on 08/19/2018 8:52:43 AM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 24 | View Replies]

To: palmer
Hillary's server did not take much skill to read her emails.

IIRC Holder, Comey, Rice, Brennan(?) and a bunch of other top officials had private servers or used public email for government business, to get around federal documentation regulations of email traffic. That were put in place by the Dems themselves.

This article goes all the way around the bend to try to keep from mentioning the multiple security violations that were ignored under the Obama regime.

So they blame the Chicoms, or the faceless coders. Anything to keep from implicating the men in the high towers.

26 posted on 08/19/2018 10:25:07 AM PDT by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 25 | View Replies]

To: texas booster
Hillary's server did not take much skill to read her emails.

That was true at the beginning before they got an SSL cert. I think that was about 5 months IIRC. But after that it was considerably more difficult to break into. It was "reasonably likely" that hostile actors gained access although that term was downgraded by McCabe/Comey/Strzok to "possible". But not simple. Not KISS.

This article goes all the way around the bend to try to keep from mentioning the multiple security violations that were ignored under the Obama regime.

As you point out a lot of the regulations were for record retention so that the Congress can have proper oversight. The main purpose of Hillary's server was to bypass recordkeeping. The other large set of security violations were related to stripping classification markings (or simply retyping parts of classified documents without any markings) for sending via her unsecure server. She encouraged the practice and set it up specifically so her underlings would do the dirty work, knowingly sending classified, and she would get the unmarked version for plausible deniability when she forwarded them to to uncleared people for personal gain.

That is all very KISS. Being pretty stupid she is ok with KISS. But the external hacking is not KISS. Nor is there evidence that Chinese intelligence assets could have been outed that way.

27 posted on 08/19/2018 10:47:18 AM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 26 | View Replies]

To: palmer; texas booster; tennmountainman; Revolutionary; Yo-Yo; reasonisfaith; JudgemAll; ...

[Nor is there evidence that Chinese intelligence assets could have been outed that way.]


Of course there is. The State Department is the customer for the CIA’s data collection efforts from its foreign national spies. From “Top Secret” on down, there is a timeline for the dissemination of classified information to various parties inside foreign governments. What Hillary’s e-mails provide is a timeline that China’s information made its way to the CIA, which then routed it to the State Department. As with news, information provided by foreign national spies is most useful when it is fresh, so there’s a pretty good chance that whatever info was provided by the CIA to State was handed over pretty much just after the CIA obtained it from the Chinese national who provided it.

This is a fairly traditional technique for mole hunting. The mole hunters (China) attempt to find out what the enemy (the US) knew and when he (the US) knew it, and connect the dots back to when the information was disseminated to domestic government officials (China) on a need-to-know basis. The advantage they have over murder cases is that the espionage is presumably ongoing, and they can surreptitiously monitor the suspects to the point that the actual mole attempts to communicate with his agent handler/case officer. Then the net closes around the mole.

This is how Hillary’s e-mails led to their exposures and deaths. By providing the breadcrumbs necessary towards outing them.


28 posted on 08/19/2018 12:36:33 PM PDT by Zhang Fei (They can have my pitbull when they pry his cold dead jaws off my ass.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Zhang Fei
Thanks for that explanation. That still requires Chinese access to the emails on the server. There's an indication in the FBI report that someone got on and read emails via a user with an email account on the server. There was no indication in the FBI report that the server was "hacked". But when I read the FBI report in 2016 I actually trusted the FBI to put out a relatively complete report, with redactions that weren't there to protect the guitly.

I now know not to trust the FBI on this issue at least. So thanks again for the explanation and it would be nice to know what actually happened.

29 posted on 08/19/2018 1:09:24 PM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 28 | View Replies]

To: UMCRevMom@aol.com
When they brought the software in from Middle East operations, they thought it was secure but didn't factor in that the environment there was "considerably less hazardous."

hmm

30 posted on 02/14/2019 11:44:56 AM PST by piasa (Attitude adjustments offered here free of charge.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: UMCRevMom@aol.com

BUMP


31 posted on 12/22/2020 12:50:00 AM PST by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-31 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson