Hillary’s Server-Gate: Email Hell

How many servers? How many techs? How many vendors? An epic national security compromise that appears to have no end. But the Hillary hired techs appear to have attempted to use Dark Web tactics and features.

There is a good bet that the FBI by this time has already cracked the erased hard-drive and discovered the contents on the pesky Hillary server and the data, documents and users are being fully investigated. This is investigation is not merely performed by an FBI field office but more it has been assigned to the entire FBI bureau where results and truth are under demand of the intelligence community.

An obscure Bill Clinton domain is noted here.

  1. In part from the Examiner:Hillary Clinton tapped into the vast network of donors cultivated by her family’s foundation to fund one of her first major initiatives as secretary of state: constructing the U.S. pavilion at the 2010 World’s Fair in Shanghai.

    Emails included in the 7,000 pages of records published by the State Department Monday suggest Clinton’s close relationships with corporate executives helped bring in the $61 million needed to build the pavilion.

    Kris Balderston, State’s special representative for global partnerships, led a frantic push to find the sponsors necessary for the expo before it opened in May 2010, relying on many of the same donors that support the Clinton Foundation to pay for the sprawling U.S. exhibit.

    Thirty-nine of the 70 corporate donors to the pavilion were also donors to the Clinton Foundation — a significant portion given that some of the sponsors were Chinese companies.

  2. Beyond Platte River, there were other vendors used by the Clinton Operation where an encryption company was hired and that platform was feeble at best. The server was done a minimum of 3 times.
  3. EXCLUSIVE: Hillary Paid to Hide Identity of the People Running Her Email Server by Breitbart:  Her attempt to hide details about her server has allowed another faceless company access to her classified email information, while doing little to nothing to secure that information from hackers.Clinton’s private email domain clintonemail.com was initially purchased by Clinton aide Eric Hoteham, who listed the Clintons’ Chappaqua, New York home as the contact address for his purchase. But the domain is actually registered to an Internet company designed to hide the true identity of the people running it.

    Clintonemail.com is currently registered to a company called Perfect Privacy, LLC.

    The company has a listed address of 12808 Gran Bay Parkway West in Jacksonville, Florida. But don’t try to get someone from “Perfect Privacy” on the phone. The company merely serves to mask its clients’ personal information by providing its own meaningless contact information on official databases.

    “Did you know that every time you register a domain name, the law requires that your personal information is added to the public “WHOIS” database, where it becomes instantly available to anyone, anywhere, anytime?,” according to the Perfect Privacy website. “Perfect Privacy eliminates these risks by ensuring that your personal information stays private. By signing up for Perfect Privacy when you register your domain, our information is published in the WHOIS database, instead of yours.”

    “We won’t reveal your identity unless required by law or if you breach our Perfect Privacy Service Agreement,” the company explains.

    Perfect Privacy, LLC is owned by Network Solutions, which in turn is owned by Web.com. Network Solutions advertises Perfect Privacy as a way to “Keep Your Contact Information Hidden With Private Registration.”

    The Jacksonville address listed for Perfect Privacy, LLC is actually just the headquarters for Web.com. It is an unassuming gray building just off Interstate 95.

    Breitbart News called a number listed for Network Solutions and, after some on-hold elevator music, an operator confirmed that clintonemail.com is one of the domains that it manages. The company has access to information in the account. But the company does not provide any kind of security for the domain, and instead encourages its clients to buy a standard Norton AntiVirus package like the kind available at retail stores.

    “No, we don’t do that,” a Network Solutions operator told Breitbart News when asked if it provides security for its clients. But, the operator, noted, “Our server automatically checks for known SPAM.”

    Network Solutions, the operator explained, can identify major hacks and can access and change information related to the email account in the event of a hack. The company declined to provide more information without speaking to the domain’s administrator.

    As Breitbart News revealed, Hillary’s email account clintonemail.com was operating with the same IP addresses as presidentclinton.com, an email account managed by the private Clinton Foundation and used by top Clinton Foundation staffers. The IP addresses were based in New York City, meaning that they were sharing the same email network at the same physical location, likely at one of the Clintons’ Midtown Manhtattan offices. Additionally, Chelsea Clinton’s work email account chelseaoffice.com was sharing the same email server.

    wjcoffice.com, an email account used by Bill Clinton staffers, including his former communications director Jay Carson, also shared the same IP address as clintonemail.com.

    Breitbart News has also discovered that clintonemail.com and presidentclinton.com were using the same IP port: port 443.

    That Hillary Clinton shared a server with the Clinton Foundation and the offices of her husband and daughter raises further concerns about the illegality of her private email use, since other Clinton-World employees not affiliated with the State Department certainly had physical access to her server and the classified information on it.

    Hillary’s private server also used the McAfee-owned MXLogic spam-filtering software, which is susceptible to a security breach and which made the information on her server accessible to McAfee employees during the numerous intervals in which her emails were passed through the MXLogic system.

    The server was prone to crashes.

    Hillary Clinton’s private email server went down in February 2010, and the State Department IT team didn’t even know that she was using a private email address, indicating that Clinton Foundation staff was working on her server as opposed to the agency’s IT professionals.

    After the State Department Help Desk sent Clinton’s private email address a routine warning notifying her that her messages were being flagged with fatal errors, Hillary’s top aide Huma Abedin sent the Secretary an email explaining to her what was going on.

    “Ur email must be back up!!,” Abedin wrote. “What happened is judith sent you an email. It bounced back. She called the email help desk at state (I guess assuming u had state email) and told them that. They had no idea it was YOU, just some random address so they emailed. Sorry about that. But regardless, means ur email must be back! R u getting other messages?”

    Hillary’s server went down again during Superstorm Sandy in 2012.

Soros and China vs. M1A1’s and F-35’s: Irregular Warfare

A kinder, gentler weapon, software, economic terrorism and exploiting weakness. What the U.S. military knows and what government leaders know but find difficult to defeat, IRREGULAR WARFARE.

The main protagonist in this section of the history book will not be a statesman or a military strategist; rather, it will be George Soros. Of course, Soros does not have an exclusive monopoly on using the financial weapon for fighting wars. Before Soros, Helmut Kohl used the deutsche mark to breach the Berlin Wall–a wall that no one had ever been able to knock down using artillery shells [see Endnote 13]. After Soros began his activities, Li Denghui [Li Teng-hui 2621 4098 6540] used the financial crisis in Southeast Asia to devalue the New Taiwan dollar, so as to launch an attack on the Hong Kong dollar and Hong Kong stocks, especially the “red-chip stocks.” [Translator’s note: “red-chip stocks” refers to stocks of companies listed on the Hong Kong stock market but controlled by mainland interests.] In addition, we have yet to mention the crowd of large and small speculators who have come en masse to this huge dinner party for money gluttons, including Morgan Stanley and Moody’s, which are famous for the credit rating reports that they issue, and which point out promising targets of attack for the benefit of the big fish in the financial world [see Endnote 14]. These two companies are typical of those entities that participate indirectly in the great feast and reap the benefits.

Soros pours out all his bitterness in his book, The Crisis of Global Capitalism. On the basis of a ghastly account of his investments in 1998, Soros analyzes the lessons to be learned from this economic crisis.

When it comes to the axiom, Know Thy Enemy, China has made an art of this objective. China does so by any means possible with notable success.

In 1999, China used analysts to understand their adversaries such that the primary mission was to achieve a wide set of competitive edges, all under the ethos of ‘Unrestricted Warfare’.

Going beyond the common air or ground war operations, there are countless other methods to gain advantage or defeat others in a competitive world.

A 200 page essay published in 1999 came to the attention of U.S. military leaders. It is a compelling read and germane to conflicts today and well into the future.

Unrestricted Warfare  by Qiao Liang and Wang Xiangsui 

Qiao Liang is a Chinese Air Force Major in the People’s Liberation Army and co-authored a book titled  ‘Unrestricted Warfare’. The scope of the book is China’s Master Plan to Destroy America.

Meanwhile, if you can stand more, there is Russia. The two countries are using the very same software warfare tactical playbook and it too has not gone unnoticed.

EU sets up unit to counter Russia’s disinformation campaigns

Janes: The EU announced on 27 August that it is forming a small “rapid response” team of officials within the European External Action Service (EEAS) to deal with Russian propaganda.

To be launched on 1 September, the team will monitor Moscow’s propaganda manoeuvres and advise EU and national authorities and their media campaigns accordingly, said EU officials.

The move comes in response to a request in March by EU leaders to Federica Mogherini, the EU’s chief of foreign and security policy, to mount a response to “Russia’s ongoing disinformation campaign”.

The team will be comprised of 8-10 Russian-speaking officials from Sweden, the UK and other countries within the EEAS, the EU’s foreign policy wing.

***

The Cyber War: As tension between the United States, Russia and China continues to escalate, reports of cyber warfare between the nations has become increasingly prominent. Modern warfare can be waged in numerous ways, and it seems that this virtual form of conflict will be an increasing theme as the 21st century develops.

 

The cyber warfare between the United States, Russia and China is part of an overall epoch-defining conflict between the three nations. This is largely based on economic disagreement and rivalry, but has also spilled over into military and territorial disputes as well. Although this war has remained physically peaceful thus far, the potential for future conflict between the three nations remains significant. And with the likes of Edward Snowden revealing the extent of government snooping, we can expect more reports of governmental cyber attacks in the future.

 

Meet Criminal Ebrahim Shabudin Costs Taxpayers Millions

Securities and Exchange Commission v. Thomas S. Wu, Ebrahim Shabudin, and Thomas T. Yu 

Exec at center of first TARP bank failure gets 8 years in prison

Fraud scheme cost taxpayers more than $300 million

More from Drew Harwell at the Washington Post: In 2009, less than a year after its $300 million taxpayer-funded rescue, the United Commercial Bank burned through the cash to become America’s first bailout-boosted bank to fail during the financial meltdown.

But this week, one of the imploded bank’s former senior executives was sentenced to eight years in prison for covering up its collapsing loans, becoming one of the few high-ranking bankers to face punishment for crisis-era crimes.

Ebrahim Shabudin, a former chief credit officer for the San Francisco-based bank, falsified records to hide major loan losses from auditors and investors in what prosecutors called a “delay-and-pray” scheme, even as the bank sought and pocketed cash from the Troubled Asset Relief Program, or TARP.

The bank, which once managed nearly $11 billion in assets and ran more than 50 branches across the United States, China and Taiwan, became the ninth largest to fail since 2007 even with help from the multitrillion-dollar bailout. Its dramatic failure cost the federal fund that insures Americans’ deposits more than $675 million.

The bailout’s chief watchdog called the years-long investigation into Shabudin “one of the most significant prosecutions” for crimes in the shadow of the financial meltdown. In March, after a six-week trial, a federal jury convicted Shabudin, 66, of seven counts of conspiracy and corporate fraud, making him one of the rare high-level bankers to head to court due to crisis-era crimes.

“Shabudin had every opportunity to do the right thing, but he was motivated instead to preserve the bank’s reputation at all costs, even if it meant committing a crime,” said Christy Goldsmith Romero, the special inspector general for TARP. “He was essentially gambling with taxpayers’ bailout dollars, and it was taxpayers who ultimately lost.”

But his sentencing may do little to quiet criticism that few big fraudsters have been punished in the meltdown’s long aftermath. The watchdog has secured convictions against 200 bank officers and other officials, but most were involved in smaller community banks, not Wall Street titans like those that used taxpayer money to pave over bad bets or dole out big bonuses.

Originally specializing in lending to Chinese Americans, the bank grew aggressively through commercial real-estate loans, becoming the first U.S. financial institution to buy a Chinese bank.

Its high-risk lending nearly doubled the bank’s loan portfolio between 2004 and 2007, to more than $8 billion, and made a rising star of chief executive Thomas Shiu-Kit (“Tommy”) Wu, who in 2006 was named auditing giant Ernst & Young’s financial-services Entrepreneur of the Year.

But as the bank’s river of risky loans began to fail, Shabudin and Wu held off on downgrading loans they knew were falling apart, ordered subordinates to understate the bank’s losses by at least $65 million, and blasted out false information in press releases, earning calls and annual reports.

Federal watchdogs including from the Federal Reserve, the Consumer Financial Protection Bureau and the FBI joined the case, making Shabudin and bank senior vice president Thomas Yu the first senior bank officials charged with fraud at a bailout-boosted financial institution.

Shabudin was the bank’s third officer to be criminally convicted, after Yu and chief financial officer Craig S. On pleaded guilty to conspiracy charges late last year. An outstanding warrant is in place for Wu, the chief executive, who has not yet been apprehended.

[SIGTARP proves that some bankers aren’t too big to jail]

Though credited with helping stabilize the wobbling economy, the bailout is remembered by many for its corporate largesse, including the hundreds of millions of dollars in bonuses paid to the heads of failing banks rescued by taxpayer cash.

Yet many of SIGTARP’s cases have focused on brazen acts of accounting fraud and smaller banks’ misspent millions. In one case, the executive of Mainstreet Bank, a community bank in Missouri, used nearly $400,000 of the bank’s $1 million bailout to buy a waterfront Florida condo.

The first person convicted of stealing bailout funds, Charles Antonucci, pleaded guilty in 2010 to bribes, fraud and embezzlement while serving as president of the Manhattan-based Park Avenue Bank. He was sentenced last month to 30 months in prison, down from a potential maximum of 135 years, because prosecutors said he cooperated with the bank probe.

William K. Black, a former bank regulator and University of Missouri associate professor specializing in white-collar crime, said Shabudin’s role in only the ninth-largest bank failure highlights the failure of regulators to combat larger frauds.

The Justice Department has still “prosecuted no banking leader for leading the three epidemics of fraud that hyper-inflated the bubble, drove the financial crisis, and caused the Great Recession,” referring to appraisal, loan and secondary-market fraud.

“Thousands of elite bankers reported pathetically inadequate” estimates of their bad debts similar to this bank’s, “and they face no investigations, much less prosecutions,” Black said. “The larger bank frauds were all bailed out this time around.”

Threats from China and Russia with Battleships?

yantar4

U.S. Shadowing Russian Ship in Atlantic Near Nuclear Submarine Areas

FreeBeacon: U.S. intelligence ships, aircraft, and satellites are closely watching a Russian military vessel in the Atlantic that has been sailing near a U.S. nuclear missile submarine base and underwater transit routes, according to Pentagon officials.

The Russian research ship Yantar has been tracked from the northern Atlantic near Canada since late August as it makes its way south toward Cuba.

Defense officials familiar with reports on the Russian ship say the Yantar is believed to be gathering intelligence on underwater sensors and other equipment used by U.S. nuclear submarines based at Kings Bay, Georgia. The submarines, their transit lanes, and training areas stretch from the coastal base through the Atlantic to Europe.

Intelligence analysts believe the ship, one of Russia’s newest military research vessels commissioned earlier this year, is part of a larger strategic intelligence-gathering operation against U.S. nuclear missile submarines and other targets.

One official, who spoke on condition of anonymity due to the sensitivity of the information, said the ship is a concern because it is equipped with deep-sea surveillance craft and cable-cutting equipment.

In addition to cutting or tapping into undersea cables, the Yantar’s gear also could be used to rescue submarines if they become entangled in underwater cables.

A second defense official said the Yantar’s mission is not only to prepare to disrupt underwater communications. The ship is also part of a Russian underwater reconnaissance program to identify undersea communications trunk lines and nodes.

A major target of the program is the Department of Defense Information Network, known as DoDIN. Moscow is seeking to map the global information network that is vital for U.S. warfighters and policymakers and is a key target of Russian information warfare efforts.

The network includes dedicated military links as well as leased communications and computer systems.

Another concern related to the sea-based intelligence activities is that Russia has been adopting new warfighting techniques the Pentagon has dubbed hybrid warfare.

Hybrid conflict combines traditional military capabilities with information warfare techniques, such as cyber attacks. The disabling of undersea Internet cables could be a part of future hybrid warfare attacks as nations become increasingly reliant on global information networks, officials said.

Non-government military analysts identified the Yantar off the coast of Nova Scotia around Aug. 24.

More recently, an underwater military blog called “7 Feet Beneath the Keel,” reported the Yantar’s location on Sept. 1 as 90 miles north of the Turks and Caicos Islands in the Atlantic Ocean, some 769 miles from Kings Bay.

A Pentagon spokesman said the military is aware of the ship. “We respect the freedom of all nations to operate military vessels in international waters in accordance with international law,” the spokesman said.

The Yantar—Russian for “amber”—was built in a Baltic Sea shipyard of the same name and launched in last spring, the state-run Sputnik news agency reported on May 23. The ship will be used for deep-sea research and rescue operations.

The ship is part of Russia’s Northern Fleet and is equipped with two deep-sea remotely piloted submersibles.

“The ship carries the latest, most innovative equipment for acoustic, biological, physical, and geophysical surveys,” the report said.

“The Yantar is equipped with a unique on-board scientific research complex which enables it to collect data on the ocean environment, both in motion and on hold. There are no similar complexes anywhere,” said Alexei Burilichev, director of deepwater research at the Russian Defense Ministry, Sputnik reported.

Steffan Watkins, a Canadian-based open-source intelligence analyst who monitors Russian ship movements, said the Russian navy sends such auxiliary vessels to the region once or twice a year to check on existing U.S. underwater sensors or cables that have been detected previously. The ships also search for new equipment on the sea floor that would reveal U.S. operations.

In April 2014, the Pentagon said it was watching two Russian spy ships, the Viktor Leonov and Nikolay Chiker operating in the Atlantic near Kings Bay.

“I don’t think the Yantar is actively pulling up underwater cables,” said Watkins. “It seems more likely‎ they’d use their underwater sensors to map out defenses to prepare for future operations, and to avoid, blind, or destroy the sensors.”

Officials said another factor increasing U.S. concerns about Russian reconnaissance is Moscow’s recent adoption of a new military doctrine that places a greater reliance on strategic nuclear forces.

In addition to research ships, Russia’s military also is building a new class of intelligence-gathering and electronic warfare ships called Yuri Ivanov-class vessels.

Germany’s Bilt newspaper reported last month that the new spy ships are designed to track and follow U.S. warships. The ships will also provide communications and fleet management, conduct electronic warfare capabilities, and gather radio and electronic intelligence. The first ship was launched in July and three others are planned.

The new Ivanov spy ship was launched the same day that President Vladimir Putin unveiled a new Russian maritime doctrine that divided naval operating areas into six regions: Atlantic, Arctic, Antarctic, Caspian, Indian Ocean, and Pacific.

Russia’s priority for shipbuilding under the new doctrine will be ballistic missile submarines and nuclear attack submarines for its Northern and Pacific fleets.

Russia is deploying a new class of nuclear missile submarines called the Borey-class and maintaining existing Delta III and Delta IV missile submarines. Another generation of submarines beyond the Borey-class is also planned for 2030 to 2050.

A Russian embassy spokesman did not respond to an email request for comment.

Chinese Warships Spotted Off Alaska Coast, A New Chapter In Chinese Assertiveness

Inquisitor: Five Chinese warships have been spotted operating off the coast of Alaska, Pentagon officials told the Wall Street Journal. The task group includes three “combat ships,” a supply vessel, and an amphibious landing ship. The warships are being tracked in the vicinity of the Aleutian Islands, a territory that is under joint U.S. and Russian control. According to the Department of Defense, this is the first time Chinese warships have been seen in this area. The composition of the task group makes its purpose fairly unambiguous. This is a group of warships designed to conduct an opposed landing.

CHINA MILITARY FRIGATE

This might sound like a big call, so here is an explanation. According to NPR, the task group is made up of three “combat ships,” a supply ship, and an amphibious landing ship. The “combat ships” are likely guided missile frigates or destroyers, deployed to protect the High Value Units (HVU), being the supply vessel and amphibious ship. Anyone familiar with naval operations will know that this is a classic configuration for an expeditionary task group, purposed with landing troops, supplies, armor, or all of the above on a hostile beach.

The frigates or destroyers maintain a dynamic screen around the other warships, acting as missile defense and attack dogs for the more vulnerable units in the group. The amphibious ship carries the troops, armor and supplies, while the supply ship is usually an underway fueling vessel designed to significantly increase operational range.

Given this, the Pentagon’s assessment that the Chinese warships are not acting in “any aggressive way” might seem a bit incongruous. It’s not. The vessels are in international waters and all ships, including Chinese warships, have a legal right of innocent passage. So long as they do not live fire any weapons or menace other shipping in the area, they are perfectly within their rights to be where they are. They may conduct limited military exercises, practice close manoeuvres, steam around in circles, or, in short, do whatever else they like. And one of the things that they can do, without anyone knowing or being able to prevent them, is soak up signals traffic from the area for the purposes of intelligence gathering. Chinese intelligence gathering is famously overt, a good example being the spy ship that observed and presumably recorded the last RIMPAC drills, the first to which the Chinese had been invited.

It has been suggested that the warships may have some link to the huge World War II anniversary parade celebrating China’s victory over Japan 70 years ago. More plausibly, other commentators suggest that the presence of Chinese warships near Alaska might be a direct response to increased U.S. Naval presence in the South China Sea. Whatever the reason, this incident fits neatly into the overall pattern of Chinese military and naval expansion that has been cause for significant concern over the last decade.

Chinese policy is no respecter of diplomatic or military conventions. The Chinese PLAN (People’s Liberation Army Navy) is currently trying to re-write maritime law in the South China Sea by publicly flouting it and has previously sent warships into the zones of interest of countries like Vietnam, the Philippines, and Thailand. On top of this, its enormous fishing fleet militia is expanding Chinese maritime activity further and further abroad. This latest manifestation of Chinese assertiveness confirms, beyond doubt, that China is serious about its goal to establish a truly global blue water navy. All that’s in doubt now is how the rest of the world will react to this new factor in the global balance of power.

Destruction by Foreign Hackers Cannot be Measured

The job of the future appears to be cyber soldiers, warriors trained to protect America from cyber-terrorism.

US Army Looks Inward for Next Batch of Cyber Specialists

The Army has turned to its own ranks in hopes of satisfying its growing need for talented cybersecurity professionals.

In June, the agency announced that all E-1- through E-8-ranked soldiers, regardless of their technical background, could apply to participate in a yearlong cyber training program, according to a recent Army press release.

Those successful candidates who complete the program would then be reclassified into the 17C military occupational specialty – also known as cyber operations specialist.

As cyber operations specialists, these soldiers will be tasked with supporting the military through offensive and defensive cyber operations.

China and Russia are using hacked data to target U.S. spies, officials say

LATimes:

Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.

At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result, according to two U.S. officials.

The Obama administration has scrambled to boost cyberdefenses for federal agencies and crucial infrastructure as foreign-based attacks have penetrated government websites and email systems, social media accounts and, most important, vast data troves containing Social Security numbers, financial information, medical records and other personal data on millions of Americans.

 

Counterintelligence officials say their adversaries combine those immense data files and then employ sophisticated software to try to isolate disparate clues that can be used to identify and track — or worse, blackmail and recruit — U.S. intelligence operatives.

Digital analysis can reveal “who is an intelligence officer, who travels where, when, who’s got financial difficulties, who’s got medical issues, [to] put together a common picture,” William Evanina, the top counterintelligence official for the U.S. intelligence community, said in an interview.

Asked whether adversaries had used this information against U.S. operatives, Evanina said, “Absolutely.”

Evanina declined to say which nations are involved. Other U.S. officials, speaking on condition of anonymity to discuss internal assessments, say China and Russia are collecting and scrutinizing sensitive U.S. computer files for counterintelligence purposes.

U.S. cyberspying is also extensive, but authorities in Moscow and Beijing frequently work in tandem with criminal hackers and private companies to find and extract sensitive data from U.S. systems, rather than steal it themselves. That limits clear targets for U.S. retaliation.

The Obama administration marked a notable exception last week when a U.S. military drone strike near Raqqah, Syria, killed the British-born leader of the CyberCaliphate, an Islamic State hacking group that has aggressively sought to persuade sympathizers to launch “lone wolf” attacks in the United States and elsewhere.

Junaid Hussain had posted names, addresses and photos of about 1,300 U.S. military and other officials on Twitter and the Internet, and urged his followers to find and kill them, according to U.S. officials. They said he also had been in contact with one of the two heavily armed attackers killed in May outside a prophet Muhammad cartoon contest in Garland, Texas. Hussain is the first known hacker targeted by a U.S. drone.

The Pentagon also is scouring the leaked list of clients and their sexual preferences from the Ashley Madison cheating website to identify service members who may have violated military rules against infidelity and be vulnerable to extortion by foreign intelligence agencies.

Far more worrisome was last year’s cyberlooting — allegedly by China — of U.S. Office of Personnel Management databases holding detailed personnel records and security clearance application files for about 22 million people, including not only current and former federal employees and contractors but also their families and friends.

“A foreign spy agency now has the ability to cross-check who has a security clearance, via the OPM breach, with who was cheating on their wife via the Ashley Madison breach, and thus identify someone to target for blackmail,” said Peter W. Singer, a fellow at the nonprofit New America Foundation in Washington and coauthor of the book “Cybersecurity and Cyberwar.”

The immense data troves can reveal marital problems, health issues and financial distress that foreign intelligence services can use to try to pry secrets from U.S. officials, according to Rep. Adam B. Schiff of Burbank, the top Democrat on the House Intelligence Committee.

“It’s very much a 21st century challenge,” Schiff said. “The whole cyberlandscape has changed.”

U.S. intelligence officials have seen evidence that China’s Ministry of State Security has combined medical data snatched in January from health insurance giant Anthem, passenger records stripped from United Airlines servers in May and the OPM security clearance files.

The Anthem breach, which involved personal data on 80 million current and former customers and employees, used malicious software that U.S. officials say is linked to the Chinese government. The information has not appeared for sale on black market websites, indicating that a foreign government controls it.

U.S. officials have not publicly blamed Beijing for the theft of the OPM and the Anthem files, but privately say both hacks were traced to the Chinese government.

The officials say China’s state security officials tapped criminal hackers to steal the files, and then gave them to private Chinese software companies to help analyze and link the information together. That kept the government’s direct fingerprints off the heist and the data aggregation that followed.

In a similar fashion, officials say, Russia’s powerful Federal Security Service, or FSB, has close connections to programmers and criminal hacking rings in Russia and has used them in a relentless series of cyberattacks.

According to U.S. officials, Russian hackers linked to the Kremlin infiltrated the State Department’s unclassified email system for several months last fall. Russian hackers also stole gigabytes of customer data from several U.S. banks and financial companies, including JPMorgan Chase & Co., last year.

A Chinese Embassy spokesman, Zhu Haiquan, said Friday that his government “firmly opposes and combats all forms of cyberattacks in accordance with the law.” The Russian Embassy did not respond to multiple requests for comment. U.S. intelligence officials want President Obama to press their concerns about Chinese hacking when Chinese President Xi Jinping visits the White House on Sept. 25.

After the recent breaches, U.S. cybersecurity officials saw a dramatic increase in the number of targeted emails sent to U.S. government employees that contain links to malicious software.

In late July, for example, an unclassified email system used by the Joint Chiefs and their staff — 4,000 people in all — was taken down for 12 days after they received sophisticated “spear-phishing” emails that U.S. officials suspect was a Russian hack.

The emails appeared to be from USAA, a bank that serves military members, and each sought to persuade the recipient to click a link that would implant spyware into the system.

Defense Secretary Ashton Carter said the hack shows the military needs to boost its cyberdefenses.

“We’re not doing as well as we need to do in job one in cyber, which is defending our own networks,” Carter said Wednesday. “Our military is dependent upon and empowered by networks for its effective operations…. We have to be better at network defense than we are now.”

Carter spent Friday in Silicon Valley in an effort to expand a partnership between the Pentagon, academia and the private sector that aims to improve the nation’s digital defenses. Carter opened an outreach office in Mountain View this year to try to draw on local expertise.

U.S. intelligence officers are supposed to cover their digital tracks and are trained to look for surveillance. Counterintelligence officials say they worry more about the scientists, engineers and other technical experts who travel abroad to support the career spies, who mostly work in U.S. embassies.

The contractors are more vulnerable to having their covers blown now, and two U.S. officials said some already have been compromised. They refused to say whether any were subject to blackmail or other overtures from foreign intelligence services.

But Evanina’s office, the National Counterintelligence and Security Center, based in Bethesda, Md., has recently updated pamphlets, training videos and desk calendars for government workers to warn them of the increased risk from foreign spy services.

“Travel vulnerabilities are greater than usual,” reads one handout. Take “extra precaution” if people “approach you in a friendly manner and seem to have a lot in common with you.”