Showing posts with label leaked. Show all posts
Showing posts with label leaked. Show all posts

Monday, March 31, 2014

Leaked Senate Report Shows Use of Torture As "Ineffective"

At The Daily News Source, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by The Daily News Source and how it is used.


Log Files


Like many other Web sites, The Daily News Source makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


The Daily News Source does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on The Daily News Source.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to The Daily News Source and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on The Daily News Source send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


The Daily News Source has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. The Daily News Source"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Leaked Senate Report Shows Use of Torture As "Ineffective"

Saturday, March 1, 2014

UFOs Finally Turn Up in Documents Leaked by Edward Snowden

01f4_ba70

A number of people have asked, if there is a government UFO cover-up, why haven’t documents relating to them turned up in the massive intelligence leak by Edward Snowden. Well, in a new document released at The Intercept, the new website devoted to publishing information about the leaks, the flying saucers have arrived. Though where they’ve turned up might be cause for concern for the Fox Mulder’s out there.


That document is a Powerpoint presentation from the British intelligence agency GCHQ (Government Communications Headquarters), titled simply enough “The Art of Deception: Training for a New Generation of Online Covert Operations“, in which three of the fifty slides are images of ‘UFOs’. Unfortunately, there is no text related to the images, so there could be a number of reasons for them being included – from pointing out people’s belief systems, through to them possibly being part of actual psychological operations (psy-ops). The only clue might be that the images are listed under a heading of “Influence and Information Operations”.


Besides the UFO references, there are a number of allusions to magic, from the mission statement to produce “cyber-magicians”, to another slide listing the historical involvement of professional magicians with psy-ops, through to finishing with an image of Teller beside a quote, “Conjuring with Information”.


Glenn Greenwald has written some commentary on the latest release of documents, pointing out how they show intelligence agencies are intentionally manipulating online discussions:


Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.



Returning to the topic of UFOs, writer/film-maker Mark Pilkington is well-acquainted with the dual topic of UFOs and intelligence agency deceptions via the intensive research he did for his book and related documentary Mirage Men. On his blog, Mark notes that “it’s clear that [intelligence agencies] consider the UFO subject, its attendant beliefs, and the vocal community surrounding it, to be a useful field of operations for their activities”. He also points out that not much has changed in the last six decades, given the similarities between the newly released document and a research paper released in 1950 titled “Exploitation of Superstitions for Purposes of Psychological Warfare” – right down to the listing of magicians who have participated in psy-ops.


If you’d like to learn more about this subject, take a look at the lecture Mark gave a couple of years ago (embedded below), titled “The Abuses of Enchantment: Folklore and Deception in the Disinformation Age”:


As Greenwald points out, “these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online… Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that… No government should be able to engage in these tactics”.


Or, as Fox Mulder told us all those years ago: “Trust no-one”.


Source: Daily Grail


Note: The featured image above is not from the GCHQ documents.







The Global Elite



UFOs Finally Turn Up in Documents Leaked by Edward Snowden

Tuesday, January 21, 2014

U. N. Climate Report Leaked to Press Paints Bleak Picture

At Not Just The News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Not Just The News and how it is used.


Log Files


Like many other Web sites, Not Just The News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Not Just The News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Not Just The News.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Not Just The News and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Not Just The News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Not Just The News has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Not Just The News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



U. N. Climate Report Leaked to Press Paints Bleak Picture

Thursday, January 16, 2014

NSA Quantum Program Leaked: Edward Snowden Reveals How US Government Spies On Offline Computers


posted on Jan, 16 2014 @ 10:17 AM


reply to post by zeroBelief

I wouldn’t be so sure about that. Cottonmouth is only one of the methods they use to monitor data in an isolated (no network) environment. If you think about the sheer number of wireless networks out there, and the fact that they already said Nightstand can inject packets of data from 8 miles away, I’d bet money that they can pretty easily intercept data from pretty much any standard wireless network if they really wanted to. They also mentioned micro-circuitry that’s used in a similar fashion to the Cottonmouth method.


Jesus, as I was writing this I just remembered the whole RSA scandal that was uncovered a few weeks back (Source). Talk about a perfect way to distribute Cottonmouth!? Who’s to say that every one of the RSA key’s sold and used with this flawed algorithm designed by the NSA, also doesn’t double as a radio-transmitter like Cottonmouth? It’d be the perfect double whammy:


Step 1: If the user is online, they can use the backdoor built-in to the algorithm to gain real-time access, like a trojan virus. This would then allow further installation/distribution of software to keep the door “held open” too.
Step 2: In the event that the PC was offline yet still accessing a secure date source via the RSA key, they would simply need a little briefcase (Nightstand) located somewhere within their acceptable 8-mile radius to accomplish the exact same thing.


This is probably worthy of another thread, but directly related to the OP. S&F for the find, should be interesting come Friday.


edit on 16-1-2014 by parad0x122 because: typo





AboveTopSecret.com New Topics In Breaking Alternative News



NSA Quantum Program Leaked: Edward Snowden Reveals How US Government Spies On Offline Computers

Tuesday, December 31, 2013

Leaked Memo Reveals Who Caused The Global Financial Collapse (It"s Not Good) - MOC #261 via @LeeCamp

At A Political Statement, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by A Political Statement and how it is used.

Log Files

Like many other Web sites, A Political Statement makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons

A Political Statement does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

  • Google, as a third party vendor, uses cookies to serve ads on A Political Statement.
  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to A Political Statement and other sites on the Internet.
  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on A Political Statement send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

A Political Statement has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. A Political Statement"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.


Leaked Memo Reveals Who Caused The Global Financial Collapse (It"s Not Good) - MOC #261 via @LeeCamp

Thursday, November 7, 2013

USAID, Uribe and Venezuelan Opposition Plotting Violence, Sabotage and Scarcity; According to Leaked Document


Source: Venezuela Analysis

US and Colombian organisations are working with the Venezuela’s political opposition to sabotage Venezuelan infrastructure, create deadly street violence, exacerbate food scarcity and provoke an international intervention, according to documents obtained by attorney and journalist Eva Golinger.


“Foreign interests, from Colombia and the US, are working with opposition groups inside Venezuela to destabilize his [President Nicolas Maduro"s] government, aiming towards sabotaging the upcoming December 8 municipal elections,” Golinger told VA via email on Wednesday.


First revealed by Golinger in a piece published by RT, the document titled, “Venezuelan Strategic Plan,” outlines a 15 point plan to be implemented as part of an on-going campaign against the Venezuelan government.


“The plan, agreed by consensus with worthy representatives of the opposition to the government of Nicolas Maduro, focuses on these objectives with the continued strong support of several global personalities, with the function of returning to Venezuela true democracy and independence, that have been kidnapped over 14 years,” the document states in an introductory paragraph.


It then continues by listing a series of 15 “actions” in point form.


The third point appears to endorse sabotage.


“Maintain and increase the sabotage that affect the population’s services, particularly the electricity system, that puts blame on the government for assumed inefficiencies and negligence,” it states.


This advice is followed by calls to, “Create situations of crisis in the streets that facilitate the intervention of North America and the forces of NATO, with support of the government of Colombia.”


“Whenever possible, the violence should cause deaths and injuries. Encourage hunger strikes of numerous days, massive mobilisations, problems in the universities and other sectors of society now identified with government institutions,” the document states.


Another point also states, “increase the problems with scarcity of basic products of the food basket.”


The document further advocates for supporting “the normalisation of US-Venezuelan relations”, and also advises the opposition to “Maintain and increase the campaign against Cuban interference”.


The Usual Suspects


“President Maduro has denounced these plots over the past few months, but most international media, and local private media, have ridiculed him and dismissed the information. Now, this document puts names and details to what Maduro has been denouncing,” Golinger told VA.


According to Golinger, the document was produced at the time of a meeting in June between US based FTI Consulting, the Colombian organisations Fundación Centro de Pensamiento Primero Colombia (Centre for Thought Foundation of Colombia First) and Fundación Internacionalismo Democratico (Democratic Internationalism Foundation). The Colombian organisations appear to be linked to former Colombian president Alvaro Uribe.


The logos of all three organisations are present in the header.


“The source of the document is the three organizations in the header that appear to have prepared the plan. I can’t reveal my source as to how I obtained it, but the authorship belongs to those organizations,” Golinger stated.


A long-time critic of former Venezuelan president Hugo Chavez and his successor, Uribe admitted last year that he had wanted to take military action against Venezuela during his presidency, but “lacked time”. He has met with numerous Venezuelan opposition figures in recent years, though former opposition presidential candidate Henrique Capriles has tried to distance himself from Uribe.


According to Golinger, the June meeting was also attended by the US Agency for International Development (USAID) regional head Mark Feierstein, psychologist and political strategist Juan Jose Rendon and leaders of the Venezuelan opposition including Maria Corina Machado, Julio Borges and Ramon Guillermo Avelado.


Machado was a signatory of the Carmona Decree, which suspended the National Assembly and declared Pedro Carmona head of state during the 2002 coup that temporarily ousted Chavez, and in June the Venezuelan government released an audio recording that allegedly implicated her in another coup plot.


A co-founder of the opposition party Primero Justicia and current member of the AN, Borges was reportedly a ringleader of a campaign by opposition legislators to not recognise Maduro’s presidential victory in April. He was involved in a brawl in the AN during a protest that month, and more recently was suspended from the ANfor 30 days for misconduct.


Aveledo is the executive secretary of the opposition umbrella group, the Democratic Unity Roundtable (MUD).


Meanwhile, Rendon is an outspoken opponent of the Venezuelan government, and USAID has long been accused by leftist governments in Latin America of unduly interfering in the domestic affairs of countries including Venezuela. In a leaked 2006 US diplomatic memo published by Wikileaks earlier this year, then US ambassador to Venezuela William Brownfield stated that the “majority” of USAID’s operations in Venezuela were related to infiltrating and undermining the ruling socialist party (PSUV).


Media War


A number of the document’s recommendations also appear to relate to the opposition’s public relations campaign.


The first point advises the “Perfecting of Henrique Capriles’ confrontational and complainant discourse”, while another point advises the use of “short messages”.


Along with urging the opposition to reach out to “opinion and personality leaders” for support, the document also indicates the plan includes the recruiting of “Venezuelan and international journalists and reporters like: CNN, The New York Times, The New York Post, Reuters, AP, EFE, The Miami Herald, Time, BBC, El Pais, Clarin, ABC among others.”


Another point advocates for the strengthening of “lobbying with the governments of Latin America, mainly in those countries which may be more sensitive to pressure from our allies, consider Colombia, Peru, Chile, Paraguay, Uruguay, Costa Rica, Guatemala, El Salvador, Mexico and Honduras”.


The document also marks Brazil, Argentina, Bolivia, Ecuador, Nicaragua as allies of Venezuela.


Today, Maduro alleged that some media outlets are part of an “economic war driven by sectors of the Venezuelan right”.


“We can not allow them to use the media for psychological warfare; there is no country in the world that would allow it,” he stated.


“And it’s not just the far right wing that is involved, in the case of the US, members from the Obama administration are actively involved in this plan. The USAID director for Latin America was present at the meeting when the document was prepared,” Golinger told VA.


At the time of writing, USAID was yet to respond to the latest allegations, but in the past US officials have denied similar allegations of plotting against the government.


“We completely reject the Venezuelan government’s allegations of U.S. [sic] government involvement in any type of conspiracy to destabilize [sic] the Venezuelan government,” the US embassy said in a statement last month.


The statement was released after three US diplomats were expelled from Venezuela for allegedly meeting with members of the opposition aligned Sumate lobby group. The organisation was founded by Machado in 2002.


Capriles is also yet to respond. Today, the de facto opposition leader visited Pope Francis at the Vatican City. Capriles urged the Pope to take a mediatory role in Venezuelan politics.


“The word of the Holy Father for our beloved Venezuela is dialogue, we have asked for his mediation via the church if possible,” Capriles tweeted.


In an open letter to the Pope Capriles states, “[t]his is a government that feeds off fear, hatred and lies, and aims to make all Venezuelans live in darkness and division.”


However, the call for mediation comes just days after Capriles released a campaign video ahead of the 8 December municipal elections reiterating claims that Maduro won the 14 April presidential elections by fraud. He also accused the government of trying to intimidate voters by recording choices at the ballot box.


“A strategy they use is to say that they know who you vote for,” Capriles stated.


However, the Maduro administration doesn’t appear to have ever issued such threats, though it has repeatedly assured that votes remain anonymous.


Moreover, the latest allegations of US interference in Venezuelan politics also comes on the heels of the release of new US National Security Agency (NSA) documents by whistleblower Edward Snowden that identify Venezuela as a priority target for electronic eavesdropping in 2007.


The leaked NSA documents also indicate that “psychological operations” have been employed in Venezuela by the US.


According to Golinger, the document she revealed “evidences the very real, dangerous plans underway against the Venezuelan government”.


“Not only should we be concerned about these revelations, [the] international media should be ashamed for not taking them seriously before it’s too late,” Golinger stated.


“Coups happen, so do foreign interventions,” she wrote.




BlackListedNews.com



USAID, Uribe and Venezuelan Opposition Plotting Violence, Sabotage and Scarcity; According to Leaked Document

Saturday, October 26, 2013

Leaked Video: FEMA Preparing Military Police For Gun Confiscations and Martial Law


Kit Daniels
Infowars.com
October 26, 2013


A member of the U.S. Military Police Corps leaked this video of a briefing with FEMA officials who openly discuss gun confiscation and the loss of our rights under martial law.


“We’ve lost all control when the military moves in on your street,” the official said. “They [FEMA] are now saying you have no more rights, you are going inside your houses.”


“They did that in Katrina, right,” he continued later in the briefing, referring to gun confiscation. “They just go on and take away people’s guns.”


“Yeah, which I think is bull****,” one of the MPs responded.


“You are going to cling to your rifle,” the commanding officer said. “They can pry it from your cold, dead hands.”


We’ve already seen this before after Hurricane Katrina in 2005:


This article was posted: Saturday, October 26, 2013 at 9:57 am


Tags: domestic news, government corruption, gun rights










Infowars



Leaked Video: FEMA Preparing Military Police For Gun Confiscations and Martial Law

Leaked Video: FEMA Preparing Military Police For Gun Confiscations and Martial Law


Kit Daniels
Prison Planet.com
October 26, 2013


A MP in the U.S. Army leaked this video of a briefing with FEMA officials who openly discuss gun confiscations and the loss of our rights under martial law.


“We’ve lost all control when the military moves in on your street,” the official said. “They [FEMA] are now saying you have no more rights, you are going inside your houses.”


“They did that in Katrina, right,” he continued later in the briefing, referring to gun confiscation. “They just go on and take away people’s guns.”


“Yeah, which I think is bull****,” the MP responded.


“You are going to cling to your rifle,” the official said. “They can pry it from your cold, dead hands.”


We’ve already seen this before after Hurricane Katrina in 2005:


This article was posted: Saturday, October 26, 2013 at 10:09 am


Tags: , , ,









Prison Planet.com



Leaked Video: FEMA Preparing Military Police For Gun Confiscations and Martial Law

Wednesday, October 16, 2013

VIDEO: Bieber Filmed New Music Video at Great Wall of China







Justin Bieber’s new music video for his song “All That Matters” has leaked, and it was filmed at the Great Wall of China.













Thanks for checking us out. Please take a look at the rest of our videos and articles.







To stay in the loop, bookmark our homepage.







VIDEO: Bieber Filmed New Music Video at Great Wall of China

Monday, October 7, 2013

Leaked Snowden docs show Canada spied on Brazil’s Mining and Energy Ministry


AFP
Oct. 7, 2013


Canada spied on communications at Brazil’s Mining and Energy Ministry, according to Canadian intelligence documents revealed Sunday by Globo television.


The documents were leaked by former U.S. intelligence contractor Edward Snowden. His disclosures including that the United States spied on the same ministry, on President Dilma Rousseff and her aides, have greatly strained US-Brazilian ties.


In the disclosures broadcast on Globo, documents purportedly from the Canadian Security Intelligence Service leaked by Snowden show a detailed outline of the Brazilian ministry’s communications including phone calls, emails and Internet traffic.


Read more


This article was posted: Monday, October 7, 2013 at 9:44 am


Tags: big brother, foreign affairs, internet









Infowars



Leaked Snowden docs show Canada spied on Brazil’s Mining and Energy Ministry

Saturday, September 28, 2013

Stunning Leaked Voicemail: This is Exactly what Bribery Sounds Like






US Daily


One Congresswoman slipped up and left behind evidence of a terrifyingly corrupt system.


This message was left for a lobbyist.  That’s right, Norton literally called a lobbyist with the sole intention of squeezing out some money.


After this voicemail hit the web, Norton released a statement saying that requesting campaign contributions was completely “above board and ‘standard.’” According to current laws, scarily enough, she’s right. However, there’s a reason that this voicemail received major press. In any other country in the world, Norton’s actions would be labeled as blatant solicitation of a bribe, (or maybe baksheesh over in Asia) but in the Washington DC, she was just playing the standard game. Taking money from the interests they regulate is how our representatives stay afloat in a system dominated by big money. It’s also how the wealthy special interests are able to keep our politicians on a tight leash.  Want to cut the cord? Check out the plan at www.represent.us.


http://daily.represent.us/voicemail-begging-for-cash/



This entry was posted in News, Videos. Bookmark the permalink.

70





Stunning Leaked Voicemail: This is Exactly what Bribery Sounds Like

Tuesday, June 11, 2013

Former senior NSA official: Maybe only 30 or 40 agency officials had access to that FISA order that leaked


posted at 2:01 pm on June 11, 2013 by Allahpundit



Normally, this is where I’d say there are only two obvious possibilities: Either I’m right that he conspired with someone higher up the chain who fed him these highly sensitive documents or the guy’s some sort of master hacker who managed to slip past NSA’s internal security to lift top-secret stuff off their servers. But I can’t say that in this case because none of us really has any idea how NSA operates. Could the IT guy have had routine access to bombshell surveillance program data? I … don’t think so, but I … guess, maybe?


Even the intel guys can’t figure it out:


Among the questions is how a contract employee at a distant NSA satellite office was able to obtain a copy of an order from the Foreign Intelligence Surveillance Court, a highly classified document that would presumably be sealed from most employees and of little use to someone in his position.


A former senior NSA official said that the number of agency officials with access to such court orders is “maybe 30 or maybe 40. Not large numbers.”…


Officials questioned some of Snowden’s assertions in his interview with the Guardian, saying that several of his claims seemed exaggerated. Among them were assertions that he could order wiretaps on anyone from “a federal judge to even the president.”


“When he said he had access to every CIA station around the world, he’s lying,” said a former senior agency official, who added that information is so closely compartmented that only a handful of top-ranking executives at the agency could access it.



“Investigators also need to determine whether anyone else was involved in disclosing the information to reporters,” per WaPo’s sources. That’s one possibility — Snowden in cahoots with a more senior person who wants the information out but doesn’t want his fingerprints on it. In theory, though, security at NSA is so tight that there’s no way to access, let alone remove, information without leaving a cyber-fingerprint of some kind. That’s the whole point of PRISM, right? Finding even the faintest cyber-prints? An agency that can track people’s physical movements based on their use of electronic devices should, one would think, be able to track their own contracted employees’ virtual movements on their premises. And yet here we are, with Snowden safely decamped with the goods to Hong Kong and Glenn Greenwald promising even more revelations.


Theory two, then: Snowden’s a hacking genius who somehow beat NSA’s internal security. Marc Ambinder assesses the degree of difficulty:


According to several current and former officials who’ve worked on NSANet, every keystroke is logged and subject to random audits. “Screengrabs” are prohibited. Documents can be printed with special facilities but that, too, leaves a record. As a mission support specialist, Snowden would have had access as part of his jobs to the physical servers and hard drives that contain material.


If he did not want to leave an audit trail, he might have disconnected a hard drive containing temporarily cached documents, brought them into an area that included desktops and hardware not cleared for such access, connected them, and then printed documents out. It is also possible that he disabled, under the guise of fixing something, access privileges for auditors. He could have temporarily escalated his own access privileges, although this would have raised flags among his superiors.


In theory, this would have alerted NISIRT, the NSA’s Information Systems Incident Response Team, which maintains a 24/7 watch over the backend of NSANet. Operational branches, including Special Source Operations (domestic and compartmented collection programs), Global Access Operations (satellites and other international SIGINT platforms), and Tailored Access Operations (cyber) have their own NISIRT team.



The agency also has a counterspy team that looks at NSA employees — and contractors? — in hopes of anticipating who might be ready to leak. Evidently they missed the Ron-Paul-donating loner who’d apparently been in contact with Glenn Greenwald for months before he skipped town. And if Ambinder’s scenario is correct, they also missed one of their hard drives going offline. Would a powerpoint on PRISM and a FISA order authorizing phone-record harvesting even be on the same hard drive? I.e. did Snowden collect this stuff steadily over time, by accessing different NSA “compartments,” rather than in one grand heist? Because if so, that’s an even more catastrophic internal security breakdown. Could NSA counterspies have missed repeated breaches?


Hopefully we’ll be able to game all of this out as part of the great national debate on NSA spying that Obama supposedly welcomes but won’t lift a finger to actually make possible. (“If President Obama really welcomed a debate, there are all kinds of things he could do in terms of declassification and disclosure to foster it.”) Exit question: Why did Snowden claim he was making $ 200,000 a year if he was only making $ 122,000? Is he including benefits in measuring his compensation? Any lie he tells, however small, will raise doubts about his motives. Seems weird that he’d open himself up to a challenge on something as minor as that.



Related Posts:



Hot Air



Former senior NSA official: Maybe only 30 or 40 agency officials had access to that FISA order that leaked

Former senior NSA official: Maybe only 30 or 40 agency officials had access to that FISA order that leaked


posted at 2:01 pm on June 11, 2013 by Allahpundit



Normally, this is where I’d say there are only two obvious possibilities: Either I’m right that he conspired with someone higher up the chain who fed him these highly sensitive documents or the guy’s some sort of master hacker who managed to slip past NSA’s internal security to lift top-secret stuff off their servers. But I can’t say that in this case because none of us really has any idea how NSA operates. Could the IT guy have had routine access to bombshell surveillance program data? I … don’t think so, but I … guess, maybe?


Even the intel guys can’t figure it out:


Among the questions is how a contract employee at a distant NSA satellite office was able to obtain a copy of an order from the Foreign Intelligence Surveillance Court, a highly classified document that would presumably be sealed from most employees and of little use to someone in his position.


A former senior NSA official said that the number of agency officials with access to such court orders is “maybe 30 or maybe 40. Not large numbers.”…


Officials questioned some of Snowden’s assertions in his interview with the Guardian, saying that several of his claims seemed exaggerated. Among them were assertions that he could order wiretaps on anyone from “a federal judge to even the president.”


“When he said he had access to every CIA station around the world, he’s lying,” said a former senior agency official, who added that information is so closely compartmented that only a handful of top-ranking executives at the agency could access it.



“Investigators also need to determine whether anyone else was involved in disclosing the information to reporters,” per WaPo’s sources. That’s one possibility — Snowden in cahoots with a more senior person who wants the information out but doesn’t want his fingerprints on it. In theory, though, security at NSA is so tight that there’s no way to access, let alone remove, information without leaving a cyber-fingerprint of some kind. That’s the whole point of PRISM, right? Finding even the faintest cyber-prints? An agency that can track people’s physical movements based on their use of electronic devices should, one would think, be able to track their own contracted employees’ virtual movements on their premises. And yet here we are, with Snowden safely decamped with the goods to Hong Kong and Glenn Greenwald promising even more revelations.


Theory two, then: Snowden’s a hacking genius who somehow beat NSA’s internal security. Marc Ambinder assesses the degree of difficulty:


According to several current and former officials who’ve worked on NSANet, every keystroke is logged and subject to random audits. “Screengrabs” are prohibited. Documents can be printed with special facilities but that, too, leaves a record. As a mission support specialist, Snowden would have had access as part of his jobs to the physical servers and hard drives that contain material.


If he did not want to leave an audit trail, he might have disconnected a hard drive containing temporarily cached documents, brought them into an area that included desktops and hardware not cleared for such access, connected them, and then printed documents out. It is also possible that he disabled, under the guise of fixing something, access privileges for auditors. He could have temporarily escalated his own access privileges, although this would have raised flags among his superiors.


In theory, this would have alerted NISIRT, the NSA’s Information Systems Incident Response Team, which maintains a 24/7 watch over the backend of NSANet. Operational branches, including Special Source Operations (domestic and compartmented collection programs), Global Access Operations (satellites and other international SIGINT platforms), and Tailored Access Operations (cyber) have their own NISIRT team.



The agency also has a counterspy team that looks at NSA employees — and contractors? — in hopes of anticipating who might be ready to leak. Evidently they missed the Ron-Paul-donating loner who’d apparently been in contact with Glenn Greenwald for months before he skipped town. And if Ambinder’s scenario is correct, they also missed one of their hard drives going offline. Would a powerpoint on PRISM and a FISA order authorizing phone-record harvesting even be on the same hard drive? I.e. did Snowden collect this stuff steadily over time, by accessing different NSA “compartments,” rather than in one grand heist? Because if so, that’s an even more catastrophic internal security breakdown. Could NSA counterspies have missed repeated breaches?


Hopefully we’ll be able to game all of this out as part of the great national debate on NSA spying that Obama supposedly welcomes but won’t lift a finger to actually make possible. (“If President Obama really welcomed a debate, there are all kinds of things he could do in terms of declassification and disclosure to foster it.”) Exit question: Why did Snowden claim he was making $ 200,000 a year if he was only making $ 122,000? Is he including benefits in measuring his compensation? Any lie he tells, however small, will raise doubts about his motives. Seems weird that he’d open himself up to a challenge on something as minor as that.



Related Posts:



Hot Air



Former senior NSA official: Maybe only 30 or 40 agency officials had access to that FISA order that leaked