#Etats-Unis : 4 millions d’agents fédéraux visés par une #cyber-attaque - Amériques - RFI
▻http://www.rfi.fr/ameriques/20150605-cyber-attaque-millions-agents-gouvernement-federal-etats-unis
Ce serait [...] la deuxième fois que des pirates chinois sont suspectés, sans que l’on sache dans quel but précis..
Hacking as Offensive Counterintelligence | The XX Committee
▻http://20committee.com/2015/06/08/hacking-as-offensive-counterintelligence
Perhaps the most damaging aspect of this is not merely that four million people are vulnerable to compromise, through no fault of their own, but that the other side now so dominates the information battlespace that it can halt actions against them. If they get word that a American counterintelligence officer, in some agency, is on the trail of one of their agents, they can pull out the stops and create mayhem for him or her: run up debts falsely (they have all the relevant data), perhaps plant dirty money in bank accounts (they have all the financials too), and thereby cause any curious officials to lose their security clearances. Since that is what would happen.
If this sounds like a nightmare scenario for Washington, DC, that’s because it is. Decades of neglect have gotten us here and it will take decades to get us out of it. The first step is admitting the extent of the problem. Getting serious about security and counterintelligence, finally, is the closely related second step. Back in the 1990’s, CI professionals warned the U.S. government about the hazards of putting everything online (we also pointed this out about internal databases that were supposed to be “secure”). Any cautions or caveats were dismissed as “old think,” out of hand. We were right about this, just as we were right about insider threats like Snowden. The past is the past, it’s time to move forward and do better without delay. The SpyWar is heating up and there’s no time to waste.