Anonymous ID: d56e60 May 26, 2019, 6:41 a.m. No.6592376   🗄️.is 🔗kun   >>2409 >>2489

Can somebody explain to me please how this Barr Declass works?

 

Does Barr know already what documents he wants to declass?

Does a doc have to be declassed before Barr can see it?

Does Barr have a security clearance to allow him to see class docs?

 

I assume that Coats as DNI head normally is the clearance center for what class docs can be declassed without harming security. Is that why DNI uses consultants supposedly, to help them decide what harms national security? Is that why Coats was bypassed? so Obama people who still have security clearances and acts as consultants don't stop the declass.

 

And why is declass necessary if Barr as a clearance?

 

Are the docs declassed to share with Barr's team who don't have clearances? Are they declassed so they can be released to public with his report?

 

Asking for a fren

Anonymous ID: d56e60 May 26, 2019, 7:03 a.m. No.6592493   🗄️.is 🔗kun   >>2502 >>2517

>>6592409

 

ty, anon.

 

I was just wondering if there is an additional hurdle besides declass?

Somebody I spoke with said that there is also a 'need to know' basis that limits declass because it may deal with top defense secrets, i.e nuclear (uranium?)

 

So, when Coats says 'appropriate to Russian hoax" he may not mean Uranium related docs.

But I guess, Barr knows exactly what he wants to declass and once it is declassed it can be released to public.

Anonymous ID: d56e60 May 26, 2019, 7:16 a.m. No.6592549   🗄️.is 🔗kun   >>2555

https://www.sfgate.com/technology/businessinsider/article/Hackers-reportedly-launched-a-cyberattack-on-13897059.php

 

Hackers reportedly launched a cyberattack on Baltimore with a leaked NSA tool

 

Hackers are reportedly using a tool leaked from the National Security Agency in a cyberattack that has plagued the city of Baltimore since May 7.

The New York Times reported that the tool, called EternalBlue, has affected residents' access to "real estate sales, water bills, health alerts," and other city services.

The tool has also been used in other major cyber attacks, including WannaCry in May 2017, as well as the June 2017 NotPetya attacks against Ukranian banks and official systems.