Showing posts with label Security Breach. Show all posts
Showing posts with label Security Breach. Show all posts

Friday, September 4, 2015

Hillary Clinton: National Security Disaster

For an army of ethically compromised defenders in politics and the media, Hillary Clinton’s email scandal is being framed as little more than a political attack aimed solely at derailing her presidential candidacy. Yet while each new revelation makes it harder to dismiss Hillary and Bill’s seemingly endless effort to monetize the Clinton Foundation by virtually any means possible, most of it is beside the point. What’s not beside the point is the reality that Hillary Clinton is a walking, talking national security disaster.
insert picture
The Daily Beast’s John R. Schindler, who wonders if other officials in the Obama administration, including the president, will be burned by this scandal, notes that many counterintelligence officials now assume Clinton’s emails have been read by foreign intelligence officials in Russia and China because her server was “wholly unencrypted for months.” A Department of Defense counterintelligence official was so certain of that reality he insisted that anyone working for the Chinese or Russians would be fired if they couldn’t explain why “they didn’t have all of Hillary’s email.”

As if on cue, RadarOnline.com revealed a person claiming to be a computer specialist allegedly has 32,000 emails from Clinton’s private server, and is putting them up for sale for $500,000. “Promising to give the trove of the former Secretary of State’s emails to the highest bidder, the specialist is showing subject lines as proof of what appear to be legitimate messages,” the website states.

At least four of those emails contain subject lines with the word “Sid,” presumably referring to Clinton hatchet man Sidney Blumenthal, whose own AOL account was breached in 2013 by the Romanian hacker known as Guccifer. That hack also revealed Clinton’s @clintonemail.com email address. The website’s source warns that if the 32,000 emails enter the public domain, “not only is Hillary finished as a potential Presidential nominee, she could put our country’s national security at risk.”

She already has, and the National Review’s Stanley Kurtz reveals the unassailable logic behind that assertion. Even if Clinton was extraordinarily lucky, and the Russians and Chinese haven’t accessed some or all of her emails, it is nonetheless incumbent on the nation’s entire security community to behave as if they did. “Doesn’t that mean that we are now making massive changes to the sources and methods of our intelligence?” Kurtz asks. “Are we now withdrawing valuable agents? Are we trying to replace methods that cannot be easily replicated? Are we now forced to rebuild a good deal of our intelligence capabilities from the ground up? Are we not suffering tremendous intelligence damage right now, regardless of what foreign intelligence services did or did not manage to snatch from Hillary’s server—simply because we are forced to assume that they got it all?”

Considering the stakes—as well as the reality there have been massive hacks at Office of Personnel Management, networks of the Department of Defense (DOD), the IRS, the State Department (called the “worst ever”), and the White House, compromising the personal data of million of Americans—the answer is an unequivocal yes.


Sunday, November 24, 2013

Vermont Confirms Security Breach To Health Care Exchange Website

MONTPELIER, Vt. (AP) — Officials overseeing the Vermont Health Connect website confirmed Friday there was a security breach on the system last month in which one user got improper access to another user’s Social Security number and other data.
A report from state to federal officials overseeing the health insurance exchanges set up under the Affordable Care Act said a consumer reported the incident with the Vermont Health Connect website on Oct. 17.
The consumer, whom officials would not identify, reported that he received in the mail — from an unnamed sender — a copy of his own application for insurance under the state exchange.
“On the back of the envelope was hand-written ‘VERMONT HEALTH CONNECT IS NOT A SECURE WEBSITE!’ This was also (written) on the back of the last page of the printed out application,” said the incident report.
The report was prepared by Greg Needle, privacy administrator with Vermont Health Connect, and filed with the federal Centers for Medicare and Medicaid Services. The Associated Press obtained it after a request under the state public records law to the Department of Vermont Health Access.

Popular Posts