← Back to context

Comment by ndsipa_pomu

14 hours ago

Obviously government secrets need to be properly secured, but the personal info/photos of a top official can often be used for blackmail or for determining close friends that could be used to compromise Patel.

There's so much speculation about how this hack could conceivably be damaging, but so little evidence that it actually contained anything damaging.

  • “The enemy broke into our nuke silo, killed our Air Force manned crew, stole the nuke codes, launched the missile. Not a big deal because we shot it down before it hit its target.”

    Most of the time, actual harm is the most important issue. In this case because that office holds so much centralized power and authority over many aspects of American life (domestic law enforcement, some foreign law enforcement, domestic counterterrorism / counterintelligence / counterespionage, and security clearance background checks for all VIPs), the means are equally as important as the ends.

    And I would throw in a wrinkle: what evidence is there that the dumps were not stripped of the most useful blackmail material? If I were in charge of a hack operation, I would dump the low impact stuff to show the world how much of a joke this guy’s security is, but only after I already used the best stuff to blackmail him months ago.

    • The scenario you're proposing is more like "They broke into our silo and launched a nuke, then they shot it down themselves."

      A successful blackmailer doesn't want the security breach exposed or investigated, they want to continue to use the victim.

  • Security through luck?

    The reality is that officials are targetted by various states looking to get some leverage, so not properly securing an email account is a serious failing unless it's part of a wider honeypot scheme. Personally, I'm not convinced that the current U.S. administration is competent enough to plan ahead and implement honeypots.

    • No point in going round and round with personal opinions and general speculation. The debate is easily settled: just point to some actual harm done by this hack.

      1 reply →