Posted on 08/18/2018 5:10:30 PM PDT by UMCRevMom@aol.com
CIA China Ops Wiped Out By 'Botched; Spy Contact System: Investigation results show indicted spy Jerry Chun Shing Lee was not the CIA's only security breach. Sloppy coding led to a back door hole in the messaging system, used by the Chinese to 'wipe out' our entire spy network.
Suddenly, in late 2010, undercover agents in China were being rounded up and hauled off for interrogation.
Under Barack Obama's administration, the Central Intelligence Agency suffered what intelligence officers are calling one of the worst disasters in decades. Suddenly, in late 2010, undercover agents in China were being rounded up and hauled off for interrogation. Eventually, its believed at least 30 were executed. The pinpoint accuracy of the arrests was unnerving.
"You could tell the Chinese weren't guessing. The Ministry of State Security were always pulling in the right people," one source relates. The investigators final report concluded that a "confluence and combination of events" had "wiped out the spy network," another of the former officials adds. Every agent arrested was eventually killed. Hillary Clinton and John Kerry escaped retribution, just like Benghazi, some say.
Over a span of the next two years (2010-2012), the Chinese government "systematically dismantled" the CIA's network of spies. To play it down, it was originally reported as "more than a dozen" instead of almost three dozen assets killed by China. Since then, everyone has been wondering how they were able to do it.
A combination of three factors came into play, but one crucially overshadowed the others. Bad coding left a security hole big enough for the Chinese to walk right in the CIA's back door.
A group of five "current and former intelligence officials" agreed to meet with reporters at news outlet Foreign Policy, to discuss the results of a "special task force" probe into what happened. The individuals requested anonymity due to the sensitive nature of the investigation.
The task force found three "potential causes of the failure," the former officials report. A double agent might have passed "information about the CIA asset network," on to his Chinese handlers but overshadowing factors are more likely to blame.
The "CIA's spy work had been sloppy and might have been detected by Chinese authorities," the sources confirm. Most importantly, "the communications system had been compromised."
"Shellshocked" intelligence officials tried to minimize the damage and hustle sources out of the country. "the last CIA case officer to have meetings with sources in China distributed large sums of cash to the agents who remained behind, hoping the money would help them flee."
When they brought the software in from Middle East operations, they thought it was secure but didn't factor in that the environment there was "considerably less hazardous."
They also underestimated China's capabilities to hack their way in. One source said the China office felt "invincible." The attitude was "that we've got this, we're untouchable."
CIA officer Jerry Chun Shing Lee was recruited about then as a double agent. Working extensively in Beijing, Lee "was in contact with his handlers at the Ministry of State Security through at least 2011."
According to court documents from his May indictment, Lee was paid hundreds of thousands of dollars by the Chinese.
The officials explain that as bad as Lee's alleged treachery was, it still can't explain what happened, simply because "information about sources is so highly compartmentalized that Lee would not have known their identities."
Other clues support the theory that the worst part of the compromise was "that China had managed to eavesdrop on the communications between agents and their CIA handlers."
Brand new sources are never trusted because they might be a spy already. Newbies only get to use a temporary "covert communications system." The one they used in China was "Internet-based and accessible from laptop or desktop computers," two former agents agreed.
The "throwaway" system was still encrypted, the agents explain and it allowed "remote communication between an intelligence officer and a source." More importantly, it "also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad."
They were supposed to be totally separate. If the interim system was breached, those using the main system should still be safe. If done correctly, there would be no way to "trace the communication back to the CIA."
It was not done correctly. According to the sources, the CIAs interim system contained a technical error. It was architecturally connected to the CIAs main covert communications platform.
As soon as the link was discovered, both the Federal Bureau of Investigation and the National Security Agency ran penetration tests, that failed miserably. Cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources.
If we could find the digital links then so could the Chinese. That would have made it relatively easy for China to deduce that the covert communications system was being used by the CIA. One expert asserts some of these links pointed back to parts of the CIAs own website.
As far back as 2010 U.S. technicians were aware of Chinas highly sophisticated internet monitoring. With their Great Firewall, they constantly monitor internet traffic looking for any unusual patterns.
The agency was well aware at the time, online anonymity of any kind was proving increasingly difficult.
Either double agent Lee gave the Chinese access to the communications platform, which he got from his handler or the Chinese may have identified another agent and accessed that persons computer.
The interim system may have been detected simply through routine pattern analysis of the internet data.
Even assets who didnt use the communications system were vulnerable. Once a person was identified as a CIA asset, Chinese intelligence could then track the agents meetings with handlers and unravel the entire network.
The sources are convinced that the Chinese shared the information they gathered with Russia, where a similar system was in use.
At the same time Chinese sources were being purged, multiple sources in Russia suddenly severed their relationship with their CIA handlers, NBC news reported and the former officials confirmed. Going dark is not a good thing. If they didnt escape, they are dead.
Not that complicated. It’s what you get when the Oval Office occupant and the director of the central blankety blank agency both hate America.
Anyone venturing to China is stupid. That police state will take all your biometric and they can track you outside country, especially if ethnic Chinese. They own you.
I bet Feinsteins office is responible for some premature organ harvesting on some of our citizens, too.
The interim system may have been detected simply through routine pattern analysis of the internet data.
Too many “mays’ and “maybes”.
The KISS answer is that Chinese security have the best hackers, and were able to find these “breadcrumbs” through Hillary and ALL other “private” servers running around DC.
It sure is strange that multiple high level government officials, ALL with TS or SCI designations, and all within the Obama administration, were set up so close together and emailed each other so often.
There is a reason that American security used to be strong, and is now not strong - elite privileges allows to the Pigs More Equal.
How is that KISS? Are you saying they hacked into Hillary's server, read emails with names of agents, and rounded them up? That's not KISS and there's no evidence for names like that being in any of the emails.
Here's KISS: some crappy CIA software connected clients back to a "secret" proxy somewhere. The Chinese figured out that the proxy belonged to the CIA, which can be leaked (KISS) or figured out (not quite as simple but doable). Then anybody connecting to that proxy would be rounded up. Sometimes that would require arresting everyone at the internet cafe and going through all of the computers, but that's easy for Chinese Communists..
IIRC Holder, Comey, Rice, Brennan(?) and a bunch of other top officials had private servers or used public email for government business, to get around federal documentation regulations of email traffic. That were put in place by the Dems themselves.
This article goes all the way around the bend to try to keep from mentioning the multiple security violations that were ignored under the Obama regime.
So they blame the Chicoms, or the faceless coders. Anything to keep from implicating the men in the high towers.
That was true at the beginning before they got an SSL cert. I think that was about 5 months IIRC. But after that it was considerably more difficult to break into. It was "reasonably likely" that hostile actors gained access although that term was downgraded by McCabe/Comey/Strzok to "possible". But not simple. Not KISS.
This article goes all the way around the bend to try to keep from mentioning the multiple security violations that were ignored under the Obama regime.
As you point out a lot of the regulations were for record retention so that the Congress can have proper oversight. The main purpose of Hillary's server was to bypass recordkeeping. The other large set of security violations were related to stripping classification markings (or simply retyping parts of classified documents without any markings) for sending via her unsecure server. She encouraged the practice and set it up specifically so her underlings would do the dirty work, knowingly sending classified, and she would get the unmarked version for plausible deniability when she forwarded them to to uncleared people for personal gain.
That is all very KISS. Being pretty stupid she is ok with KISS. But the external hacking is not KISS. Nor is there evidence that Chinese intelligence assets could have been outed that way.
[Nor is there evidence that Chinese intelligence assets could have been outed that way.]
This is a fairly traditional technique for mole hunting. The mole hunters (China) attempt to find out what the enemy (the US) knew and when he (the US) knew it, and connect the dots back to when the information was disseminated to domestic government officials (China) on a need-to-know basis. The advantage they have over murder cases is that the espionage is presumably ongoing, and they can surreptitiously monitor the suspects to the point that the actual mole attempts to communicate with his agent handler/case officer. Then the net closes around the mole.
This is how Hillary’s e-mails led to their exposures and deaths. By providing the breadcrumbs necessary towards outing them.
I now know not to trust the FBI on this issue at least. So thanks again for the explanation and it would be nice to know what actually happened.
hmm
BUMP
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.