4 Comments
User's avatar
Rollin J Bellfi, Captain's avatar

The comsec compromise on Houthi attack by the national security team and while using the commercial encrytped communications app, Signal, is serious. A damage assessment of the comsec "spillage" will be conducted. Knowing what may have been compromised in the content, the real time effects, any enduring damages or further openings, as well as those involved is vital and standard. In making a comparison to Hillary's compromise of 40+ months and over 30,000 communication threads while at Secretary of State to this one spillage event provides a good comparison on intelligence damage assessment and hypocrisy that further damages our nation. Hillary had a regular computer server installed in her home closet and operated like any.persons home server without any protections. She directed improper (technically an illegal tap) connection into the State Department secure information network and frequently transferred information from an approved network to her home brew everyday server. She certainly was proven to have bridged the "air gap" between our most secure systems and her home brewed closet server. In DOD such a compromise results in loss of clearance and loss of employment with exposure to prosecution, I've seen it happen.

Hillary illegal email system was crossed with Defense, CIA, NSA, systems. It was an espionage agents dream. When such a immeasurable compromise occurs for years, there's enough there to defeat operations and planning in all our military, all our intelligence with added economic damages, it destroys our nations ability to be secure.

Knowing what's on the encrypted side and how it appears when deecrypted side is the ultimate win. So when this massive compromise was discovered the need for a damage assessment is vital. No damage assessment was performed, Hillary was set to run for office, even the words "damage assessment" were not made public and knowledgeable media ignored it. Her home brewed email were the most damaging comsec incident bar none and is on par to US code breaking of German Enigma and Japan JN25 Naval codes - nation killing war winning comsec compromise. You'll never see anything on the compromise that Hillary's email caused, there was no real damage assessment - Obama/Comey gift to the presidential contender. Don't expect the Communist Chinese to reveal what they gained. There were reports that Romanian intelligence transferred some of Hillary's home brew email. Hillary didn't erase all her email, she missed a few and the FBI found them, they included Top Secret/SCI/Keyhole items, our highest comsec level. Mishandling TS/SCI/Keyhole is a crime and the law does not require intent, only that comsec practices were ignored by anyone who was so entrusted.

Unrelated? but sometime later the entire US operation using local human intelligence (humint) sources was rolled up in Lebanon and the Middle East, many were caught and killed; also it's reported that our entire CCP humint sources were ID'd, monitored, some turned and finally all our local sources were captured and disappeared, so our entire operation in China was neutralized. Unrelated, during the Obama Hillary regime the CCP successfully went after the employment records of all Defense Department, Executive Branch and others. They knew where to look. The CCP knows the entire history, background investigations, travel orders, training, personal ID information of millions (myself included - got the compromise notification). Please continue to bring up Hillary so we may continue to contrast these events, it beats comparing egg prices.

Rollin J Bellfi, Captain's avatar

As an addendum the Hillary emails included markings that B3 CIA PERS/ORG present, this endangers CIA people, ops and methods. Hillary traveled to China in Feb 2009 at the start of her 2009-2013 Sec of State reign. She used the easily compromised Blackberry phone for all her comms (laziness), it should be expected that her communications setup was compromised by Communist China early on. Hillary's Sec of State failed a cybersecurity assessment held by the Inspector General every year while SecState. IG noting significant deficiencies by Sec of State. IMO Hillary was to lazy to take the extra step to use approved comsec methods such as SIPR. We will never know what the full potential losses and how the compromise continued. Hillary was using the regular internet that a 2nd year CIS student can break. The current Trump Security team compromise is serious even if it gives a one time snap shot of a military operation at one moment in time. Hillary didn't immediately report at least two apparent hacking events on her home brew server that her staff observed (staff was clueless untrained in comsec otherwise they might report her).

Jan's avatar

Also, I love John Pavlovitz’s writing. My ‘second favorite’ Substack writer 😉

Jan's avatar

Shook me all night long. AC/DC. Maybe?