So China hacked the OPM and is now reading all of the personal data of Federal Employees getting background checks. This follows on the heels of Russian crime syndicates getting their hands on IRS data. This only renders the extent to which any claims by the USG that it cares one fig about the security of average Americans utterly risible. How could such a travesty happen?

Oh, and it gets worse. The IRS has known that they sucked at this for a decade and a half.

The security of taxpayer data has been an IRS problem for years. In an October report, the IRS’ independent watchdog called it the agency’s number one problem. “Computer security has been problematic for the IRS since 1997,” according to the report.

The Chinese military has compromised US Cybersecurity to the point where they possess an extensive database of technical information on numerous DOD ACAT -1D* programs. These systems include the following :

Some of the weapons form the backbone of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. The designs included those for the advanced Patriot missile system, known as PAC-3; an Army system for shooting down ballistic missiles, known as the Terminal High Altitude Area Defense, or THAAD; and the Navy’s Aegis ballistic-missile defense system. Also identified in the report are vital combat aircraft and ships, including the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship, which is designed to patrol waters close to shore. Also on the list is the most expensive weapons system ever built — the F-35 Joint Strike Fighter, which is on track to cost about $1.4 trillion.

With really brilliant and dedicated people like Hillary Rodham Clinton holding sensitive data totally secret like the hidden cards of a killer Texas No-Look Hold ‘Em hand, you wonder how this sort of thing could possible happen. Maureen Dowd** gives us special insight into just how much a President Hillary would really care about keeping important data safe.

Keeping a single account mingling business and personal with your own server wasn’t about “convenience.” It was about expedience. You became judge and jury on what’s relevant because you didn’t want to leave digital fingerprints for others to retrace. You could have had Huma carry two devices if you really couldn’t hoist an extra few ounces. You insisted on piggybacking on Bill’s server, even though his aides were worried about hackers, because you were gaming the system for 2016. (Or even 2012.)

Like the IRS; Hillary Clinton was told this plan would put her data at risk. Of course her data was at risk in the official system as well. Absolutely none of the data the USG currently handles can be considered secure. This is a direct consequence of the attitude our current leadership takes towards securing it. As James Carville put it; Hillary didn’t want [mc_name name=’Rep. Trey Gowdy (R-SC)’ chamber=’house’ mcid=’G000566′ ] reading her emails. Having it read by foreign intelligence services or crime syndicates was no particular big deal.

And that’s just basically it. Hillary Rodham Clinton personifies at attitude that screwing up the lives of the people that a politician governs means nothing as long as there are no political consequences. “What difference does it make?” Which is what our electorate will have to ask itself next Fall when Hillary accepts the gift-wrapped Democratic Nomination and presents herself to the electorate for her POTUS coronation. Leadership Theater leads to Security Theater. Security Theater leads to a false assumption of safety that will one day be lethal. But then again, the false assumption of safety is what a Hillary Clinton for President Campaign is banking on. What else does the woman have to offer?

*-The big money defense backbone programs.

**- Yes, even Maureen Dowd’s standards have been breached. You need to be passed out from Guinness to not make it over that particular bar.