Anonymous ID: b3927a March 29, 2018, 9:53 a.m. No.831527   🗄️.is 🔗kun

>>831246

A little bit on Sen. G background

 

https:// pagesix.com/2007/01/08/power-queen-breakup-blues/

Dad ditches Disney exec for second cousin

 

http:// www.nydailynews.com/news/senator-designate-kirsten-gillibrand-tapped-dad-lobbyist-connections-article-1.422309

Dad''s lobbyist connections

 

https:// mobile.nytimes.com/2009/02/01/nyregion/01family.html

Grandmother''s connections

Anonymous ID: b3927a March 29, 2018, 10:17 a.m. No.831691   🗄️.is 🔗kun   >>1783

>>831569

If the MO is to use something big to cover up something small…

What if the "hacked" personnel data going back was utilized for a specific group of people.

If HRC sold off data and access what if…

http:// m.washingtonexaminer.com/updated-chinese-other-nations-hacked-va-computers-officials-cant-account-for-everything-stolen/article/2531106

For starter …

Then

https:// www.lawfareblog.com/why-opm-hack-far-worse-you-imagine

Given that the data sets stolen in the OPM go back to 1985, the information known to the attacker potentially includes all data collected during my initial clearance process and every comprehensive mandatory update, including all of the data from multiple polygraph examinations.

 

So

https:// news.clearancejobs.com/2016/11/06/scattered-castles-jpas-clearance-documents-stored/

Scattered Castles is a closed system with limited access for security personnel and does not electronically connect with JPAS.  Intelligence Community Policy Guidance 704.5 provides the authority and basic information regarding Scattered Castles.  I have never had access to Scattered Castles so I cannot comment on its functionality.  The primary reason that information contained in Scattered Castles is not transferred into JPAS is that Scattered Castles not only holds SCI eligibility and access information for military and contractor personnel, but also employees of the IC agencies.  That information would be of particular interest to foreign intelligence agencies and to allow this information to flow between systems would create an unacceptable risk.  As Mister Rogers would say, “Can you say hacking?”

 

Which would lead to

 

https:// www.theguardian.com/us-news/2017/may/20/china-dismantled-cia-spying-operations-new-york-times

 

One wonders why they lost the ability to identify…