Anonymous ID: 940df9 Dec. 2, 2018, 12:16 p.m. No.4116538   🗄️.is 🔗kun   >>6598 >>6695

>>4002800

 

Q !CbboFOtcZs 15 Jun 2018 - 5:43:38 PM - 1504

>>1762921

What came out in IG report?

JC gmail.

They all had them.

Re_read drops re: private emails re: convicting HRC = convicting themselves.

Why did the entire Hussein admin use private emails?

ES is KEY.

What a wonderful day.

Q

 

Gmail Drafts Used to Hide Highly Illegal & Corrupt Schemes

Q !!mG7VJxZNCI 14 Aug 2018 - 7:02:45 PM - 1876

(Q lists types of illegal content captured.)

———————

Why did ES make public NSA CLAS tools?

In order to divert, distract, and scare those acting in an illegal capacity. This causes illegal activity networks to review internal systems for weaknesses and vulnerabilities, which they attemp to rectify and repair. This activity, if under review in real time, will make it possible to identify the scale and depth of unkown portions of an existing illegal activity network. Move some wood in the woodpile and see what scampers out. Snakes, spiders, and rats, oh my!

Think XKeyscore + PRISM specifically.

Was such tech kept from 'elected' officials?

Was such tech kept from 'elected' directors?

Elected people may be aware of XKeyscores existance, and portions of how it works, through intelligence reports produced. They can get an idea of the methods or types of collection based on what is included in the report, even if they were not briefed on the technology itself. If elected people act illegally and already know XKeyscore exists, revealing its existence would not harm current collection processes. The secret parts of government have a 20 year technological lead on the public sector. If a given technology is released to the public, then the secret parts of the government already have something better.

Why was DOJ">DOJ">NO SUCH AGENCY created?

To shrink and professionalize the federal government.

…the founding of the Department of Justice (DOJ) in 1870 as an effort to shrink and professionalize the federal government…it has been overlooked that the DOJ Act eliminated about one-third of federal legal staff. The founding of the DOJ had less to do with Reconstruction, and more to do with “retrenchment” (budget cutting and anti-patronage reform). The DOJ’s creation was linked with major professionalization efforts, such as the founding of modern bar associations, to make the practice of law more exclusive and more independent from partisan politics…it was at the very leading edge of two other major trends: the professionalization of American lawyers and the rise of bureaucratic autonomy and expertise.

https://www.stanfordlawreview.org/print/article/the-creation-of-the-department-of-justice/

In late 1867, the Senate Committee on the Judiciary asked Attorney General Henry Stanbery to respond to several questions concerning the efficiency of the government’s legal departments. Stanbery replied that a solicitor general was needed to argue the government’s cases before the Supreme Court, and that the centralization of the government’s legal business under one department would improve the quality of the work.

https://blogs.loc.gov/law/2017/12/the-creation-of-the-department-of-justice/

 

The National Security Agency is established, Nov. 4, 1952

The agency’s origins can be traced back to 1949, with the formation of the Armed Forces Security Agency. Under the aegis of the Joint Chiefs of Staff, this organization was ostensibly charged with coordinating the communications and electronic intelligence activities of the Army Security Agency, the Naval Security Group and the Air Force Security Service.

In late 1951, CIA Director Walter Bedell Smith sent a memo to James Lay, executive secretary of the National Security Council. He recommended that the government undertake a broad survey of its communications intelligence activities.

His proposal was quickly approved. The resulting document, completed in June 1952, was known as the “Brownell Report,” for Herbert Brownell, the committee’s chairman and a future U.S. attorney general.

President Harry S. Truman authorized the creation of NSA in a letter he wrote in June 1952, which itself remained classified for decades. It was formally established through a revision of National Security Council Intelligence Directive 9 on Oct. 24, 1952, and officially came into existence on Nov. 4.

https://www.politico.com/story/2010/11/the-national-security-agency-is-established-nov-4-1952-044671

 

//'//'//'//'/////PART 1 END\\\\\\

Anonymous ID: 940df9 Dec. 2, 2018, 12:21 p.m. No.4116598   🗄️.is 🔗kun   >>6668

//'//'//'//'/////PART 1 >>4116538 \\\\\\

//'//'//'//'/////PART 2 START\\\\\\

 

Think SIGINT.

Document 4. Department of Defense Directive S-5100.20, "The National Security Agency and the Central Security Service," December 23, 1971.

https://nsarchive2.gwu.edu/NSAEBB/NSAEBB23/docs/doc04.pdf

Originally classified Secret, this directive remains in effect today, with minor changes. Key portions of the directive specify the NSA's role in managing the signals intelligence effort for the entire U.S. government, the role of the Secretary of Defense in appointing and supervising the work of the NSA's director, the authorities assigned to the director of NSA, and the relationships that NSA is expected to maintain with other components of the government.

Among the specific responsibilities assigned to the director are preparation of a consolidated SIGINT program and budget for Defense Department SIGINT activities, the "exercise of SIGINT operational control over SIGINT activities of the United States," and the production and dissemination of SIGINT "in accordance with the objectives, requirements, and priorities established by the Director of Central Intelligence."

The directive reflects the 1958 addition of electronic intelligence to NSA's responsibilities, making it the national authority for both components of signals intelligence.

Document 5b. Department of Justice, "Report of the Inquiry into CIA-Related Electronic Surveillance Activities," 1976, pp. 77-9.

https://nsarchive2.gwu.edu/NSAEBB/NSAEBB23/docs/doc05.pdf

NSCID 6 is the most recently available NSCID concerning SIGINT. It was still in effect at least as late as 1987. An earlier version of the directive was issued in 1958, when NSA was first assigned responsibility for electronics intelligence.

https://nsarchive2.gwu.edu/NSAEBB/NSAEBB23/

What ADVANTAGES exist to BIG TECH, other ABC off/on agencies, elected officials, CEOs, FOREIGN ADVERSARIES etc. if such information is learned?

They know they are caught with their pants down with @Snowden revelations. They will now modify existing strategies as well as develop new strategies to manage information in an effort to minimize the amount of damage to their network and continue their illegal activities. Knowledge of XKeyscore may even limit their ability to function in many environments they previously assumed were observation free.

What price are you (the PUBLIC) willing to pay?

As entrenched destructive structures, they will require increasing funds, which the average individual will be required to provide, thereby increasing the destructive structures growth while at the same time reducing and limiting the individuals potentials to be free by increasing the heavy financial burdens. How much money can we (entrenched destructive structures) extract from all individuals before individuals cry out against paying such monies?

Third Party Contractors performing the role of government angency tasks, outsourcing, increases the costs of operating a given agency and/or task, therefore increases the cost of operating the government overall.

Ex. Construction General Laborer direct hire $10-$15 per hour, outsourced through a temporary agency, $20-$30 per hour. For the same skilled labor force, outsourcing increases labor costs and therefore increases overall costs. This middleman extracts money for connecting a to b while not involved in the specific work carried out by the third party employee.

If we believe those in the Military and the NSA are operating with righteous judgement as patriots to restore our governments original intent, then we must be willing to accept the difficulties which will be required to achieve this goal.

Did you ever play HIDE-AND-SEEK?

Hide-and-seek, or hide-and-go-seek, is a popular children's game in which any number of players conceal themselves in the environment, to be found by one or more seekers.

https://en.wikipedia.org/wiki/Hide-and-seek

themselves = News

Q

 

//'//'//'//'/////PART 2 END \\\\\\

Anonymous ID: 940df9 Dec. 2, 2018, 12:27 p.m. No.4116668   🗄️.is 🔗kun

//'//'//'//'/////PART 2 >>4116598 \\\\\\

//'//'//'//'/////PART 3 START\\\\\\

XKeyscore: NSA tool collects 'nearly everything a user does on the internet'

"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".

One presentation claims the program covers nearly everything a typical user does on the internet, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing real-time interception of an individual's internet activity.

But XKeyscore provides the technological capability…to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails…even when there is no known email account associated with the individual being targeted.

https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

 

Food for thought:

 

Jeff Sessions Activated!

Q !!mG7VJxZNCI 17 Sep 2018 - 6:43:18 PM - 2197

Activate ]SESSIONS[

Q

 

XKeyscore

[Sessions]>>>[Processing Engine]>>>[Database]>>>[User_Queries]