Just some guesses. Does anyone have anything
on "CLAS?" I have several leads for PRIME
in the text below.
>Expand your thinking.
<Who >leaked Vault7 to WL?
WHO = White House Official? Vault7 were the CIA version
of Snowden's NSA leaks. Also, they contained no actual code.
>Who returned fire?
NYT published an article that blamed "muh Russians," but that
article got information from Rendition Infosec who claims to be
made up of "former NSA, DoD, and US Cyber Command operators."
Those should be white hats, right?
>OP Name: Fiddler
Fiddler is an HTTP proxy tool that can monitor web traffic.
It has a legitimate reason to be there, but what is to stop the clowns
from using this to monitor anyone, anywhere? Use the http information
from targeted machines?
>@Snowden
This is probably targeted AT Snowden. It is NSA striking back at Snow
for his release of the N_A tools. Note that Vault7 is C_A tools; Snow
released N_A tools. Tit for tat?
>Mission 1: Infiltrate
This pertains to the "Bigdata" people. Step 1 is to put your people in place.
How to do this? Easy, pick the winner by putting $100 million behind
your preferred company. Why did MySpace fail, yet Fakebook become
the #1 social company in no time? If you control the money, you pick
the winners and losers.
>Mission 2: Centralize
Do step one everywhere, and have them all report back to a central
command center. Where best for this? Giggle, of course.
>Mission 3: Secure
If I wanted to put something where I could get to it, and no one else
could easily get to it (digitally), it would be North Korea. No Internet
infrastructure except what I set up. This is what ES was doing there.
>Mission 4: Expose to HARM
Wikileaks has a "harm-minimization" ethic. They redact their releases
to help prevent harm to innocent parties. Is big data the opposite?
I can find no acronym beyond "High-speed Anti-Radiation Missile"
which is basically a missile to destroy targeting radars by attacking the
source of the radiation (that's the antenna, which is near the transmitter/
receiver).
>(Date)
The C_A release was almost exactly one year ago, today. Coincidence?
>(WH interference)
Nope.
>(WH directive)
My guess? Yep. Tit for tat. Snow gave up N_A tools, so they lose their
toys, too.
>Mission 5: Russia LINK
See above with NYT almost immediate "Muh Russians" article. The
link to Russia is their counter. It was probably aimed at Snowden, who
was reported to be in Russia but who is probably not.
>(2013 timeline of events)
The 2013 timeline are the releases of the N_A documents by Snow.
>(1/17/14)
Hussein gave a speech on tying N_A, N_A, N_A (never C_A) to
big data for "foreign surveillance." He more or less said "we're using
Fakebook and Giggle to watch everyone" but denied it would be
Americans in America. Red flag for me… If Hussein makes a point to
say "Not X," I'm thinking "Must be X." Has he ever told the truth?
>Think.
Trying
>Learn.
Still digging.
>Mission 6: Fiddler > Ghost-PRIME
Fiddler is discussed above; an HTTP monitoring program. Ghost-
PRIME: Privacy and Identity Management for Europe. I found this
link from JA's link dealing with BBG and the TOR project. TOR
is a C_A tool for privacy… PRIME is a European tool for privacy.
I think that Fiddler has been enhanced to a concealed (Ghost)
version of "privacy" with PRIME. The Prime project website is now
-
It was www.prime-project.eu
Another possible lead is "Telos Ghost" which is supposed to be
secure, as well. Another C_A front?
Last, another possible point of research: www.fp7-prime.eu/home_page
Supposedly anti-terror…. maybe instead, MKUltra staging group?
>Mission 7: CLAS
I can find nothing definitive on this. My guess is it deals with setting up
cyber security certifications or similar for putting "agents" out there
to tell everyone they're safe (when they're not) such as PRIME or
TOR as shown above
>Mission 8: Whistle Blower traps - jobs C-3567k
Just another example of the above. We know that the C_A was
running the press traps, as shown by Q's "bravo!" on the Apache find.
>Mission 9: Censorship
Now that you know everyone through the corrupted "privacy" guards…
Remember, it is only folks like us who would use TOR, or be whistle-
blowers, or worry about our privacy… how better to find us malcontents
than to corrupt the tools we use to hide ourselves. GhostNET might also
this. Well, they know whom to target, because we are the ones trying
to hide.
>CLAS +relay
I really wish I had a lead on CLAS. It is key to this, but I am at a loss
>Q