Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

REPORT: China systematically crippled CIA operations, killing or imprisoning up to 20 sources
Reuters / Business Insider ^ | MAY 21, 2017 | Doina Chiacu

Posted on 08/29/2018 2:33:50 PM PDT by CivilWarBrewing

WASHINGTON (Reuters) - China killed or imprisoned 18 to 20 CIA sources from 2010 to 2012, hobbling U.S. spying operations in a massive intelligence breach whose origin has not been identified, the New York Times reported on Saturday.

Investigators remain divided over whether there was a spy within the Central Intelligence Agency who betrayed the sources or whether the Chinese hacked the CIA's covert communications system, the newspaper reported, citing current and former U.S. officials.

(Excerpt) Read more at businessinsider.com ...


TOPICS: Free Republic; Front Page News; News/Current Events; US: Arizona
KEYWORDS: 2010; 2011; 2012; arizona; china; cia; hacking; hillary; humanassets; humint; johnmccain; server; spooks
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 next last
To: Telepathic Intruder

It’s probable that Trump has not just Hillary’s Sec of State emails and her personal confidential emails, but he also has the Clinton Foundation emails

Most people, even the most honest and squeaky clean of Eagle Scouts, with high level position are taught early on to never put anything in an email that they would not like have presented to a Grand Jury so possability of public disclosure is moderating factor in most email trafficking

What happens when the emails are sent and received by a person who is secure in the knowledge that the correspondence is secret and that person is a corrupt, hubris filled and arrogant individual who is running multiple criminal scams and is certain she is above the law

Guess we may soon find out.

Could be interesting

FWIW, the media has been glossing over that the fact that a minimum of four serious felonies had to be commited just to transfer each and every one of the classified documents on Hillary’s illegal home brew servers out of the secure State Dept servers and on to Hillary’s server or cell phone.

Anyone with access to the State Department secure server system is fully aware that they are engaging in serious felony level criminal activity and anyone receiving those documents outside the secure server system is fully aware that they are engaging in serious felony level criminal activity that could compromise US national security

Sounds like the elusive “intent “ that Comey claims he tried so hard to find but could not


21 posted on 08/29/2018 3:09:03 PM PDT by rdcbn
[ Post Reply | Private Reply | To 2 | View Replies]

To: CivilWarBrewing
WELL, WELL, WELL.. YOU WOULDN'T SUPPOSE CHINA HACKING HILLARY'S ILLEGAL PRIVATE SERVER FOR FOUR YEARS STRAIGHT WOULD HAVE ANYTHING TO DO WITH IT, WOULD YOU???
That couldn’t happen. We know that Hillary was scrupulous about security; she said so in Hard Choices:
Like other sensitive government agencies the State Department was frequently target and increasingly sophisticated phishing attempts. When we first arrived at State, these attempts were similar to the fraudulent emails many Americans experience at home on their personal computers. The often sloppy early attempts to penetrate our secure systems were easy to spot. But by 2012, the sophistication and fluency had advanced considerably, with the attackers impersonating State Department officials in an attempt to dupe their colleagues into opening legitimate looking attachments.

When we traveled to sensitive places like Russia, we often received warnings from the Department security officials to leave our BlackBerries, laptops—anything that communicated with the outside world—on the plane, with their batteries removed to prevent foreign intelligence services from compromising them. Even in friendly settings we conducted business under strict security precautions, taking care where and how we read secret material and used our technology. One means of protecting material was to read it inside an opaque tent in a hotel room. In less well equipped settings we were told to improvise by reading sensitive material with a blanket over our head. I felt like I was 10 years old again, reading covertly by flashlight under the covers after bedtime. On more than one occasion I was cautioned not to speak freely in my own hotel room.

And it wasn't just US government agencies and officials who were targets. American companies were also in the crosshairs. I fielded calls from frustrated CEOs complaining about aggressive theft of an intellectual property and trade secrets, even breaches of their home computers. To better focus our efforts against this increasingly serious threat, I appointed the Department’s first Coordinator for Cyber Issues in February 2011.


22 posted on 08/29/2018 3:09:08 PM PDT by conservatism_IS_compassion (Journalism promotes itself - and promotes big government - by speaking ill of society.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: cpdiii

Just the idea that the Chicoms had access to hillary’s server and everyone in the govt illegally communicating with her on that server...the blackmailing implications are mind boggling


23 posted on 08/29/2018 3:10:26 PM PDT by Electric Graffiti (Jeff Sessions IS the insurance policy)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Telepathic Intruder
But, but, but "The RussiansTM"!!! /CNN
24 posted on 08/29/2018 3:11:05 PM PDT by SaveFerris (Luke 17:28 ... as it was in the days of Lot; they did eat, they drank, they bought, they sold ......)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Telepathic Intruder

I susoect...all of them.


25 posted on 08/29/2018 3:13:56 PM PDT by madison10 (Pray for President Trump and the midterm elections -88-)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CivilWarBrewing

I’ve probably posted this 35 times. If you google “18 CIA China” you will find this story is from various articles published in 2010.

As one example: https://www.axios.com/how-the-cias-spy-ring-in-china-collapsed-1516315831-68615025-9940-44a9-bc89-35ef1bbcb151.html

It was also described by the NYTimes in 2010. At least 18 CIA operatives were rolled up, imprisoned and executed.

Of course all the articles from 2010 are rapidly being replaced and shoved down the stack by 2017/2018 articles.


26 posted on 08/29/2018 3:18:06 PM PDT by Attention Surplus Disorder (Apoplectic is where we want them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CivilWarBrewing

There was a Chinese spy in Feinstein’s employ. I would start there.


27 posted on 08/29/2018 3:36:26 PM PDT by Crucial
[ Post Reply | Private Reply | To 1 | View Replies]

To: CivilWarBrewing
Those poor people. This is a drop in the bucket of what Mueller is trying to keep hidden by the ridiculous Trump witch hunt.
28 posted on 08/29/2018 3:38:22 PM PDT by Vision (Obama corrupted, sought to weaken and fundamentally change America; he didn't plan on being stopped)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Telepathic Intruder
"How many of these sources that were imprisoned or killed were lifted off of Hillary's server?"

By name? Probably none. But as some other freeper pointed out a few weeks ago (before the China hack story), the Chinese can give different secret information to different suspects, then track what information pops up in Hillary's email to narrow down the suspects.

29 posted on 08/29/2018 3:39:22 PM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 2 | View Replies]

To: khelus

BCC = Blind China Copy...


30 posted on 08/29/2018 3:45:21 PM PDT by null and void (McCain is dead but his ego lives on.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Telepathic Intruder

china killed American run spies.

No kidding.


31 posted on 08/29/2018 3:47:37 PM PDT by Chickensoup (Leftists today are speaking as if they plan to commence to commit genocide against conservatives.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CivilWarBrewing

Hacking Hillary gave them access to Weiner, Bill Clinton, that dweeb Epstein, Gowdy, McConnell, the Podesta brothers and god only knows who else that is in that inner circle.
China knows about all their pedophile and “pizza” ring.

All it takes is for a Chinese agent to approach one of them with the info and tell them what info they need.

The perverts in DC are compromised.


32 posted on 08/29/2018 3:48:08 PM PDT by DesertRhino (Dog is man's best friend, and moslems hate dogs. Add that up. ....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CivilWarBrewing

If true, that will add to the evidence gthat Hillary and her cohorts are traitors to the United States of America.

Now that Hillary will never be president, she should be4 convicted to qualify as a one-time rope tester.


33 posted on 08/29/2018 3:50:49 PM PDT by Carl Vehse
[ Post Reply | Private Reply | To 1 | View Replies]

To: CivilWarBrewing

And just as a curiosity, can anyone think of any way our intelligence agencies have made America safe? More respected? More effective? Worth the hundreds of billions that have gone into our black budget over the years?


34 posted on 08/29/2018 3:55:04 PM PDT by DesertRhino (Dog is man's best friend, and moslems hate dogs. Add that up. ....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TalBlack

Huma Abedin also is known to have left her laptop unattended in a hotel room in China.


35 posted on 08/29/2018 4:04:46 PM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 15 | View Replies]

To: JoSixChip
massive intelligence breach whose origin has not been identified

Funny they should say that because this was already blamed on a low level guy they caught a while back.

36 posted on 08/29/2018 4:06:02 PM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 7 | View Replies]

To: CivilWarBrewing

I dunno. Ask Sen. Feingold’s chauffeur.


37 posted on 08/29/2018 4:09:12 PM PDT by Eleutheria5 (“If you are not prepared to use force to defend civilization, then be prepared to accept barbarism.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservatism_IS_compassion

They think they are too “cool” to follow those protocols and look silly... you can bet none of them bothered.


38 posted on 08/29/2018 4:11:28 PM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 22 | View Replies]

To: piasa

That these traitors receive Justice. That would make my day.


39 posted on 08/29/2018 4:56:02 PM PDT by hal ogen (First Amendment or Reeducation Camp?)
[ Post Reply | Private Reply | To 38 | View Replies]

To: CivilWarBrewing
China killed or imprisoned 18 to 20 CIA sources from 2010 to 2012

That's a real head scratcher as to how that could have happened.

----------------------------------------------------------

"Here is a timeline of the email scandal that has dogged the Democratic presidential candidate's campaign:

:: 13 January, 2009: The internet domain clintonemail.com is registered, operating from a private server based in New York.

:: 21 January, 2009: Hillary Clinton is sworn in as US Secretary of State.

:: 1 February, 2013: Mrs Clinton's tenure as Secretary of State comes to an end."

https://news.sky.com/story/hillary-clinton-emails-timeline-of-how-scandal-unfolded-10636032

40 posted on 08/29/2018 5:15:24 PM PDT by Karl Spooner
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson