Why We Ask: Our mission and operations are funded 100% by conservatives like you. Please help us continue to extend Liberty to the next generation and support the 2024 Year-End Campaign today.

June 16, 2015

China’s Big Hack Attack

Upon hearing of the massive data breach of employee information from the Office of Personnel Management (OPM) — allegedly by hackers working for the Chinese government — Kay Coles James, the former director of OPM under George W. Bush, told me she was “aghast,” adding, “I can’t think about the national security implications of a foreign government knowing every single federal employee, where they work, where they live, all of their significant data. Think about what that information can do in the hands of people who want to do us harm.” Joel Brenner, a former top counterintelligence official for the U.S. government, has thought about it. He called the hack attack “potentially devastating.” Brenner told The Washington Post that personnel files “contain decades of personal information about people with (security) clearances … which makes them easier to recruit for foreign espionage on behalf of a foreign country.”

Upon hearing of the massive data breach of employee information from the Office of Personnel Management (OPM) — allegedly by hackers working for the Chinese government — Kay Coles James, the former director of OPM under George W. Bush, told me she was “aghast,” adding, “I can’t think about the national security implications of a foreign government knowing every single federal employee, where they work, where they live, all of their significant data. Think about what that information can do in the hands of people who want to do us harm.”

Joel Brenner, a former top counterintelligence official for the U.S. government, has thought about it. He called the hack attack “potentially devastating.” Brenner told The Washington Post that personnel files “contain decades of personal information about people with (security) clearances … which makes them easier to recruit for foreign espionage on behalf of a foreign country.”

The Associated Press reported “two people briefed on the investigation disclosed Friday that as many as 14 million current and former civilian U.S. government employees have had their information exposed to hackers, a far higher figure than the 4 million the Obama administration initially disclosed.”

While the U.S. government should have seen this coming, clearly it was unprepared for such an invasion of privacy. By some estimates there are thousands of Chinese cyber-warriors specifically trained to carry out electronic espionage against the U.S. and other nations with information the Chinese believe they can use for business, military and political purposes. Why do we always seem to be fighting the last war (which we are not winning either) instead of the one we’re in?

Under a worst-case scenario outlined by Theweek.com, the information obtained by hackers could be used to derail trains (although they seem to be derailing just fine all by themselves without outside help), disrupt air traffic control systems, explode chemical plants and gas pipelines and compromise electric grids causing large-scale blackouts across the country. Who needs missiles when a laptop and the right software can be just as effective?

It doesn’t take a spy novelist to come up with a scenario in which a Chinese government agent approaches someone with a top security clearance and threatens to expose a dark secret in his or her past, possibly destroying family and career, unless he or she cooperates and hands over information to Beijing. The Chinese agent would likely have details about medications his target is taking to ward off depression, or some other malady, possibly making him more vulnerable to pressure.

The former chairman of the House Intelligence Committee, Mike Rogers, says another possible use of the hacked information could be to shape fake emails crafted to look legitimate while injecting spyware and other viruses on the networks of government agencies or businesses the Chinese wish to penetrate.

The two major political parties aren’t helping. Last week, Democrats blocked a Republican attempt to add a cybersecurity bill to a sweeping defense measure. The vote was 56-40, four short of the required number. Democrats have warned about cyber-spying, but voted against moving forward with legislation because Republicans sought to merge the two bills, which included budget changes Democrats and President Obama oppose. As usual in Washington, playing the blame game is more important to politicians than accomplishing something that promotes the general welfare.

If any humor can come from a serious situation, it was in a statement by OPM spokesman, Samuel Schumach. When asked to provide more details on the damage caused by the hacking, Schumach said: “For security reasons, we will not discuss specifics of the information that might have been compromised.”

What possible “security” reasons could there be when clearly there was insufficient security at OPM? Perhaps reporters should ask this of the Chinese, since they now appear to be in possession of all the pertinent information.

© 2015 Tribune Content Agency, LLC.

Who We Are

The Patriot Post is a highly acclaimed weekday digest of news analysis, policy and opinion written from the heartland — as opposed to the MSM’s ubiquitous Beltway echo chambers — for grassroots leaders nationwide. More

What We Offer

On the Web

We provide solid conservative perspective on the most important issues, including analysis, opinion columns, headline summaries, memes, cartoons and much more.

Via Email

Choose our full-length Digest or our quick-reading Snapshot for a summary of important news. We also offer Cartoons & Memes on Monday and Alexander’s column on Wednesday.

Our Mission

The Patriot Post is steadfast in our mission to extend the endowment of Liberty to the next generation by advocating for individual rights and responsibilities, supporting the restoration of constitutional limits on government and the judiciary, and promoting free enterprise, national defense and traditional American values. We are a rock-solid conservative touchstone for the expanding ranks of grassroots Americans Patriots from all walks of life. Our mission and operation budgets are not financed by any political or special interest groups, and to protect our editorial integrity, we accept no advertising. We are sustained solely by you. Please support The Patriot Fund today!


The Patriot Post and Patriot Foundation Trust, in keeping with our Military Mission of Service to our uniformed service members and veterans, are proud to support and promote the National Medal of Honor Heritage Center, the Congressional Medal of Honor Society, both the Honoring the Sacrifice and Warrior Freedom Service Dogs aiding wounded veterans, the Tunnel to Towers Foundation, the National Veterans Entrepreneurship Program, the Folds of Honor outreach, and Officer Christian Fellowship, the Air University Foundation, and Naval War College Foundation, and the Naval Aviation Museum Foundation. "Greater love has no one than this, to lay down one's life for his friends." (John 15:13)

★ PUBLIUS ★

“Our cause is noble; it is the cause of mankind!” —George Washington

Please join us in prayer for our nation — that righteous leaders would rise and prevail and we would be united as Americans. Pray also for the protection of our Military Patriots, Veterans, First Responders, and their families. Please lift up your Patriot team and our mission to support and defend our Republic's Founding Principle of Liberty, that the fires of freedom would be ignited in the hearts and minds of our countrymen.

The Patriot Post is protected speech, as enumerated in the First Amendment and enforced by the Second Amendment of the Constitution of the United States of America, in accordance with the endowed and unalienable Rights of All Mankind.

Copyright © 2024 The Patriot Post. All Rights Reserved.

The Patriot Post does not support Internet Explorer. We recommend installing the latest version of Microsoft Edge, Mozilla Firefox, or Google Chrome.