{"id":532,"date":"2015-06-22T20:44:29","date_gmt":"2015-06-22T20:44:29","guid":{"rendered":"http:\/\/54.201.249.27\/?p=532"},"modified":"2015-06-22T20:44:29","modified_gmt":"2015-06-22T20:44:29","slug":"business-insider-the-latest-china-hack-was-classic-espionage-on-a-scale-weve-never-seen-before","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/business-insider-the-latest-china-hack-was-classic-espionage-on-a-scale-weve-never-seen-before\/","title":{"rendered":"Business Insider: The latest China hack was classic espionage ‘on a scale we\u2019ve never seen before’"},"content":{"rendered":"

The massive breach of a federal personnel database allegedly at the hands of of Chinese hackers was “classic espionage” on an unprecedented scale, a senior administration official told the\u00a0New York Times<\/a>.<\/p>\n

\u201cThis was classic espionage, just on a scale we\u2019ve never seen before from a traditional adversary,\u201d the official said.<\/p>\n

\u201cAnd it\u2019s not a satisfactory answer to say, \u2018We found it and stopped it,\u2019 when we should have seen it coming years ago.\u201d<\/p>\n

The Obama administration has been reluctant to place blame on the Chinese government for the hack, but there seems to be little doubt among experts and\u00a0investigators<\/a>\u00a0regarding who carried out the theft.<\/p>\n

\u201cUnlike other actors operating from China who conduct industrial espionage, take intellectual property or steal defense technology, this group has primarily targeted information that would enable it to build a database of Americans, with a likely focus on diplomats, intelligence operatives and those with business in China,”\u00a0Mike Oppenheim, the manager of threat intelligence at the cybersecurity firm FireEye, told the Times…<\/p>\n

Read more:\u00a0\u00a0http:\/\/www.businessinsider.com\/opm-hack-was-classic-espionage-on-a-scale-weve-never-seen-before-2015-6#ixzz3dpGQvQ7S<\/a><\/p>\n

Read the entire story\u00a0here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

The massive breach of a federal personnel database allegedly at the hands of of Chinese hackers was “classic espionage” on an unprecedented scale…<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,10],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/532"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}