How China Hacked The US Treasury
(00:01.056)
So the Chinese have hacked our treasury. Come on, boy. Chinese state-sponsored hackers breached the US Treasury Department’s computer security guardrails and stole documents. The treasury is calling it a major incident.
They compromised a cybersecurity service provider, able to access, they were unclassified documents. Okay, I guess this happened back in December. All right, let me explain to you how this would be handled if Markowski was in charge. Real simple, you get caught.
You get caught, yeah, just give me a follow-up. you guys, you know, you get caught hacking our stuff. We are going to wreck your computer systems. We are gonna, we’ll shut down your, I’m gonna shut down your water. Just don’t bother. Again, how is this not a mutually assured destruction type of a scenario? Okay, mad, mutually assured destruction. Same type of situation we have with nukes.
If you’re planning on messing around with any of our stuff, we are gonna come back at you 110%. And again, how are we not protected with this stuff? I was thinking about, we’re thinking about Goldfinger. Remember Pussy Galore and her flying circus? Yeah, they wanted to, well, they were breaking into Fort Knox, remember Goldfinger? Break it, or Goldfinger, break it into Fort Knox.
gonna set off a nuke, wrecking the whole gold supply there, driving up the value of his gold. Kind of an ingenious plot if you actually think about it. Again, pussy corner, flying circus, they were much easier on the eyes, I guess, than Chinese hackers. But what are you gonna do? I tell you what you’re gonna do. You go back at him if this is actually true.
(02:25.518)
If this is actually believable, for the life of me, I can’t understand. I don’t get it. You are gonna hack our stuff, we’re gonna come back at you. But again, let’s go back in time. Let’s go back in time to, what was it, 2010? 2010, Snowden and WikiLeaks and all that information comes out and how we are.
not necessarily hacking, but yeah, we’re following what our allies and what they’re saying and what they’re doing. And we’re looking at American search history and we’re gobbling up all of this information. Again, I guess you can take a look at it. People who live in glass houses maybe shouldn’t throw stones, but again, it’s a whole new world.
We’ve talked about this in the past when it comes to cyber security and the type of business that that involves in. You need to have, our government needs to have closed systems. Meaning that there’s no access to the outside, there’s no access to the internet. You wanna have an internet,
Fine, Yeah, you can have an intranet. No access from the outside. Another obscure sub-reference. Remember in Mission Impossible, the first one? Remember Ethan Hasta? He’s got to sneak into the CIA. He’s got to steal the knock list, the list of agents. And remember that? He’s hanging from the ceiling with the rope and…
can’t touch the floor and the temperature can’t go above a certain amount there inside of the CIA’s headquarters. It needs to be that difficult. know, that the knock list is not on the internet. You can’t get in from the outside. You have to actually be there at the actual computer and the server. There is no way you can get in. To me, pretty simple problem to solve, quite frankly. Watchdog on wallstreet.com.