So Hegseth had an unsecured internet line run into his office specifically to connect to signal on a personal computer

Interesting. I have experience with Fed Gov networks, especially DOD. I don't see how this seems possible, and how isn't a giant breach of ethics and national security.

A dirty line installation doesn't magically appear. Somebody needs to sign off on a contract for the install, a contractor would need clearance to run the copper/fiber line to the building (because it would have to bypass the internal Fed Gov network switches/routers/etc.) and thus, there would be a paper trail.

The computer would need to be dirty as well, because government furnished hardware is encrypted and imaged to connect to a specific domain.

So, I guess I just find it strange. A lot of policy would have to be ignored to make this a possibility. Policy in place specifically to protect national security.
Apparently all of that happened and it is connected to a "dirty" computer in his office for his personal use.
 
This guy has no clue what he's doing. Secure lines are available, but he had an unsecure one run into the office. The only thing I can think of is it's to keep things from internal security.

What sort of things do you suppose he wants to keep from the Pentagon's internal security?

I don't know either, but I can't think of a legitimate reason. Can you?

PURE UNADULTERATED BULLSHIT

Kim Iversen CONFIRMS that the Warmonger-Likudnick Axis is behind the Pete Hegseth Affair​


 
That's nice, kid, but that was for civilians without access to secure resources.

I personally use a "secure" email server that is definitely not as secure as the Pentagon's servers because I don't get access to that.
 
This guy has no clue what he's doing. Secure lines are available, but he had an unsecure one run into the office. The only thing I can think of is it's to keep things from internal security.

What sort of things do you suppose he wants to keep from the Pentagon's internal security?

I don't know either, but I can't think of a legitimate reason. Can you?

Who says?

You have no source, Crepitus :auiqs.jpg:
 
That's nice, kid, but that was for civilians without access to secure resources.

I personally use a "secure" email server that is definitely not as secure as the Pentagon's servers because I don't get access to that.

The document, published in December, details that highly-targeted government officials should use "end-to-end encrypted communications" as part of its "best practices" advice. End-to-end encryption is understood as a secure method of communication, where a sender's message is encrypted and can only be decrypted by the recipient of the message.

The CISA guidance specifically cited that government officials should download "end-to-end encrypted communications" platforms to their cellphones and computers, specifically citing Signal as an app to download to comply with the best practices.

This memo is in regards to "highly targeted government officials"
 
This guy has no clue what he's doing. Secure lines are available, but he had an unsecure one run into the office. The only thing I can think of is it's to keep things from internal security.

What sort of things do you suppose he wants to keep from the Pentagon's internal security?

I don't know either, but I can't think of a legitimate reason. Can you?

"...two people familiar with the line told The Associated Press."

Immediately dismissed as made up.
 
Apparently all of that happened and it is connected to a "dirty" computer in his office for his personal use.
I would need a lot more information. Accessing an app using government equipment that is blacklisted on a government web appliance isn't really a possibility. Accessing it on a dirty computer using a dirty hotspot seems more realistic.

Installing a dirty line bypassing all the federal network infrastructure in place would seem easily discovered and a huge red flag, as it directly counters national security protocols. 🤷‍♀️
 
They're talking about people without access to secure communications on the daily, not the SecDef.

CISA strongly urges highly targeted individuals to immediately review and apply the best practices below to protect mobile communications. Highly targeted individuals should assume that all communications between mobile devices – including government and personal devices – and internet services are at risk of interception or manipulation. While no single solution eliminates all risks, implementing these best practices significantly enhances protection of sensitive communications against government-affiliated and other malicious cyber actors," the guide reads.

Under the Biden administration in 2024, CISA released a "Mobile Communications Best Practice Guidance" for "highly targeted individuals," who were defined as high-ranking government officials or politicians who are "likely to possess information of interest to these threat actors." The document specifically addressed high-targeted politicos and officials, though it noted the guide was "applicable to all audiences."



I'm not seeing anything in there about people with without secured access. It says people at all levels, to be used on all computers and cell phones.
 
I would need a lot more information. Accessing an app using government equipment that is blacklisted on a government web appliance isn't really a possibility. Accessing it on a dirty computer using a dirty hotspot seems more realistic.

Installing a dirty line bypassing all the federal network infrastructure in place would seem easily discovered and a huge red flag, as it directly counters national security protocols. 🤷‍♀️
It's explained in the linked piece that they are sometimes used in the pentagon to monitor sites that would otherwise be blocked, so we know they have a process for bringing them in. They also state it's connected to hegseth's [personal "dirty" computer so at least it's not connected into the secure network.
 
And since there were no war plans on it everything was fine, right?
She was the Secretary of State you moron we have no idea what was on her server, but it was classified material. You are nothing but a partisan hack and because of your one sided bullshit your opinion means squat.
 
This guy has no clue what he's doing. Secure lines are available, but he had an unsecure one run into the office. The only thing I can think of is it's to keep things from internal security.

What sort of things do you suppose he wants to keep from the Pentagon's internal security?

I don't know either, but I can't think of a legitimate reason. Can you?

Secretary Hegseth Threatens the Deep State

By J.B. Shurk
American Thinker

Make no mistake: The silly attempts to create a public “narrative” that Secretary Hegseth threatens national security are part of the same Intelligence Community operation that targeted him last winter. It’s quite revealing how desperate the Deep State is to keep “outsiders” away from the levers of power, isn’t it?

If the CIA and its Establishment co-conspirators don’t “own” you, they don’t want you around sticking your nose in their business. And it is big business! They’ve got elections to rig (foreign and domestic!), governments to topple (for the right price), and trillions of dollars in war funding to spend! They can’t let the president of the United States and his secretary of Defense get in their way! Don’t Trump and Hegseth understand that they’re just here for cute photo ops while the permanently installed shadow government runs the global show? Heck, Defense secretary Lloyd Austin disappeared for days at a time, and nobody even noticed! The same information warfare specialists who continue to call Hegseth a “drunk” never said anything about Austin performing his duties while under sedation!


 
It's explained in the linked piece that they are sometimes used in the pentagon to monitor sites that would otherwise be blocked, so we know they have a process for bringing them in.
I know what it says, but I'm skeptical how they actually know that, because it's not actually how it works. 🤷‍♀️

There are no directly dirty lines once a copper/fiber line meets a FedGov network. Secure networks have hardware and software firewalls and routers that scan every incoming and outgoing packet of data, and routes it dependant upon specific network policies. There are redundancies. The data also becomes encrypted.

So a dirty line to a reporter or an 'unnamed source' could mean an IP address exception giving access to a certain app.

For comparison, the line providing broadband to my house I consider dirty even though it runs through a consumer grade firewall/router.
 

New Topics

Back
Top Bottom