Posted on 08/29/2018 2:33:50 PM PDT by CivilWarBrewing
WASHINGTON (Reuters) - China killed or imprisoned 18 to 20 CIA sources from 2010 to 2012, hobbling U.S. spying operations in a massive intelligence breach whose origin has not been identified, the New York Times reported on Saturday.
Investigators remain divided over whether there was a spy within the Central Intelligence Agency who betrayed the sources or whether the Chinese hacked the CIA's covert communications system, the newspaper reported, citing current and former U.S. officials.
(Excerpt) Read more at businessinsider.com ...
Its probable that Trump has not just Hillarys Sec of State emails and her personal confidential emails, but he also has the Clinton Foundation emails
Most people, even the most honest and squeaky clean of Eagle Scouts, with high level position are taught early on to never put anything in an email that they would not like have presented to a Grand Jury so possability of public disclosure is moderating factor in most email trafficking
What happens when the emails are sent and received by a person who is secure in the knowledge that the correspondence is secret and that person is a corrupt, hubris filled and arrogant individual who is running multiple criminal scams and is certain she is above the law
Guess we may soon find out.
Could be interesting
FWIW, the media has been glossing over that the fact that a minimum of four serious felonies had to be commited just to transfer each and every one of the classified documents on Hillarys illegal home brew servers out of the secure State Dept servers and on to Hillarys server or cell phone.
Anyone with access to the State Department secure server system is fully aware that they are engaging in serious felony level criminal activity and anyone receiving those documents outside the secure server system is fully aware that they are engaging in serious felony level criminal activity that could compromise US national security
Sounds like the elusive intent that Comey claims he tried so hard to find but could not
That couldnt happen. We know that Hillary was scrupulous about security; she said so in Hard Choices:Like other sensitive government agencies the State Department was frequently target and increasingly sophisticated phishing attempts. When we first arrived at State, these attempts were similar to the fraudulent emails many Americans experience at home on their personal computers. The often sloppy early attempts to penetrate our secure systems were easy to spot. But by 2012, the sophistication and fluency had advanced considerably, with the attackers impersonating State Department officials in an attempt to dupe their colleagues into opening legitimate looking attachments.When we traveled to sensitive places like Russia, we often received warnings from the Department security officials to leave our BlackBerries, laptopsanything that communicated with the outside worldon the plane, with their batteries removed to prevent foreign intelligence services from compromising them. Even in friendly settings we conducted business under strict security precautions, taking care where and how we read secret material and used our technology. One means of protecting material was to read it inside an opaque tent in a hotel room. In less well equipped settings we were told to improvise by reading sensitive material with a blanket over our head. I felt like I was 10 years old again, reading covertly by flashlight under the covers after bedtime. On more than one occasion I was cautioned not to speak freely in my own hotel room.
And it wasn't just US government agencies and officials who were targets. American companies were also in the crosshairs. I fielded calls from frustrated CEOs complaining about aggressive theft of an intellectual property and trade secrets, even breaches of their home computers. To better focus our efforts against this increasingly serious threat, I appointed the Departments first Coordinator for Cyber Issues in February 2011.
Just the idea that the Chicoms had access to hillary’s server and everyone in the govt illegally communicating with her on that server...the blackmailing implications are mind boggling
I susoect...all of them.
I’ve probably posted this 35 times. If you google “18 CIA China” you will find this story is from various articles published in 2010.
As one example: https://www.axios.com/how-the-cias-spy-ring-in-china-collapsed-1516315831-68615025-9940-44a9-bc89-35ef1bbcb151.html
It was also described by the NYTimes in 2010. At least 18 CIA operatives were rolled up, imprisoned and executed.
Of course all the articles from 2010 are rapidly being replaced and shoved down the stack by 2017/2018 articles.
There was a Chinese spy in Feinsteins employ. I would start there.
By name? Probably none. But as some other freeper pointed out a few weeks ago (before the China hack story), the Chinese can give different secret information to different suspects, then track what information pops up in Hillary's email to narrow down the suspects.
BCC = Blind China Copy...
china killed American run spies.
No kidding.
Hacking Hillary gave them access to Weiner, Bill Clinton, that dweeb Epstein, Gowdy, McConnell, the Podesta brothers and god only knows who else that is in that inner circle.
China knows about all their pedophile and “pizza” ring.
All it takes is for a Chinese agent to approach one of them with the info and tell them what info they need.
The perverts in DC are compromised.
If true, that will add to the evidence gthat Hillary and her cohorts are traitors to the United States of America.
Now that Hillary will never be president, she should be4 convicted to qualify as a one-time rope tester.
And just as a curiosity, can anyone think of any way our intelligence agencies have made America safe? More respected? More effective? Worth the hundreds of billions that have gone into our black budget over the years?
Huma Abedin also is known to have left her laptop unattended in a hotel room in China.
Funny they should say that because this was already blamed on a low level guy they caught a while back.
I dunno. Ask Sen. Feingold’s chauffeur.
They think they are too “cool” to follow those protocols and look silly... you can bet none of them bothered.
That these traitors receive Justice. That would make my day.
That's a real head scratcher as to how that could have happened.
----------------------------------------------------------
"Here is a timeline of the email scandal that has dogged the Democratic presidential candidate's campaign:
:: 13 January, 2009: The internet domain clintonemail.com is registered, operating from a private server based in New York.
:: 21 January, 2009: Hillary Clinton is sworn in as US Secretary of State.
:: 1 February, 2013: Mrs Clinton's tenure as Secretary of State comes to an end."
https://news.sky.com/story/hillary-clinton-emails-timeline-of-how-scandal-unfolded-10636032
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.