Anonymous ID: 19ab4d Feb. 3, 2018, 10:18 a.m. No.258551   🗄️.is 🔗kun   >>8697 >>8921

>>258155

Really?

 

Seriously?

 

Your claim that the memo is "redacted and watered down" means that either

 

  1. You've seen the "REAL" memo yourself

 

  1. YOU'RE A LYING, GLOWING NIGGER CLOWN SHITTING UP THIS BOARD.

 

So, either post a copy of the "REAL" memo with sauce,

 

or

 

FUCK OFF AND KYS.

 

In the dark... in the rain. Because nobody cares about you.

 

BO, please ban this shill and delete this shit.

Anonymous ID: 19ab4d Feb. 3, 2018, 12:19 p.m. No.259416   🗄️.is 🔗kun   >>9439

>>258697

 

>we need to see exactly how our government

>spies on its citizens

 

That goes directly to something called "sources and methods" and THAT, my fellow anon, is the holy grail that you don't get to see. I'll give you an example:

 

The "Stingray" device (mimics a cell tower) allows a cell phone to be used as a tracking device, all one needs is the phone number. There are multiple LEO's that have the Stingray. That is public knowledge at this point, but there's more.

 

Police have devices that will suck all data out of your cell phone in a matter of minutes at a stop. Some LEO's have been using these regularly. Ever hear of "Stop and Frisk"? It wasn't long ago that this was strictly national intelligence stuff, then it went downstream to .mil and now it's in the hands of LEO's at the local level.

 

Business intelligence geeks have proved that a cell phone's mike can be turned on and off remotely, even if powered down, as long as the battery is in the phone. Once above a certain level, that's a possibility. Expect to see a downward migration of this technology too.

 

Per CALEA, cell towers must be capable of DF'ing cell phones in real-time and the phone companies keep records of that info because storage is practically free. It's something they don't want in the court system (they don't want people to know) but when a crime occurs all the LEO's have to do is ask which cell phones were near a specific spot within a 20 minute (or whatever time frame) period of time. That's called a list of suspects.

 

A bit of data mining and they have the names and data on everyone who has their phone tied to their name. The rest of the cell phones are unknown. If they're on, the phone company can give a general location in real time. Stingray takes over. Subject is stopped by police who mine their cell phone to get all their past calls, messages, photos, browsing history, all social media passwords, banking info, everything. You can't believe how much data people store in smart phones, and it takes 1-2 minutes to get it all.

 

But guess what? Even if you're never considered a suspect, the data leached off your phone is now in their database for future reference.

 

Let's say that based on this procedure, the LEO strongly suspect an individual. They now use "normal" methods and procedures to develop a case against that individual so as to not have to reveal how they zeroed in on that person in the first place or what initial evidence they got from them in that manner.

 

Expand your thinking. What this means is that merely being in the wrong place at the wrong time makes you a suspect. What do you have on your phone that might give the LEO's something to investigate?

 

All of this is common knowledge to anyone with any awareness at all. This technological genie is out of the bottle. Don't want it to happen? Don't carry a cell phone.

 

We might be able to get some documents released that prove MI6 was sitting in Fort Meade using our equipment to spy on American citizens at the request of the clowns who couldn't legally do it, but don't expect them to explain how they did it.

Anonymous ID: 19ab4d Feb. 3, 2018, 3:12 p.m. No.260539   🗄️.is 🔗kun   >>0979

>>259439

 

I'll try one more time.

 

If you re-read the letter of transmission from the White House, you'll see that a standard exists on the releasing of classified information.

 

The information must be of such public interest that it OUTWEIGHS the harm releasing such information would cause.

 

The argument over sources and methods is that revealing such sources and methods will damage national security. The major point is that we have no idea what the latest tech is. What can quantum computing do? What is available? We don't know.

 

Another example is 9/11. If you are aware of Dr. Judy Wood and have seen her examination of the evidence, it is clear that the ONLY thing that could have taken those building down was direct energy weapons. Think the president doesn't know that? Think that kind of information will be released? Dream on. It's not happening because then everyone will realize that nukes have been outdated strategic weapons for decades and they'll realize they've been lied to.

 

Sources and methods isn't going to happen in terms of getting them to OFFICIALLY tell us how they spy on us because that would cause major, major problems.