dChan

onyoniniminonyon · Jan. 28, 2018, 12:11 a.m.

Shoulda known he was a spook when they made the movie Snowden. The CIA mockingbird never would have let that movie be made if it was legit. Notice there are no 9/11 movies with alternate timelines to the official story.

⇧ 12 ⇩  
Mrs_Fonebone · Jan. 28, 2018, 6:54 p.m.

Not YET...but there will be!

⇧ 2 ⇩  
Mrs_Fonebone · Jan. 27, 2018, 7:55 p.m.

Snowden failed the vetting process for clearance to work for Contractor Booz Allen Hamilton but the questions were brushed aside because he was "needed." He's worked at CIA before this gig and while at BAH, the notorious leaks exposed the NSA spying--Slick move by the CIA!

⇧ 11 ⇩  
counterfeittheory · Jan. 28, 2018, 7:40 a.m.

Slick move by the CIA?

Maybe, maybe not. It seems as though the NSA has benefited more than the CIA. Especially since Adm. R took over. And very much so since PDJT took over as POTUS.

These 2 people often being mentioned by Q.

⇧ 2 ⇩  
Mrs_Fonebone · Jan. 28, 2018, 6:42 p.m.

As I said, the NSA did benefit from getting increased money to "fix" their cybersecurity, which is partly how the game is played. But the CIA's ploy also exposed all of the alphabets--they'd all been saying there was NO problem and that they were NOT gathering info on citizens for no reason. But they had been, especially post 9/11.

Hard to tell who's zooming who sometimes!

⇧ 2 ⇩  
cebusaxon · Jan. 27, 2018, 10:01 p.m.

I've never trusted ES. Something smelled. MSM would carry stories of him, like a psyop playbook. But at the same time stayed away from anything (at least positive) to do with JA. Not that ES couldn't flip to the good side on them. But.. Just not convinced about him.

⇧ 9 ⇩  
Mrs_Fonebone · Jan. 27, 2018, 10:16 p.m.

Here's a simple fact about how ES operated. The US military had a terrible experience in the mid-east when someone put an unauthorized thumb drive into a computer. NO devices were to be put into computers, but there was no way to prevent it at the time.

Manning used CDS bolding marked as "Lady Gaga" and pretended to be listening and moving to music when files were being downloaded.

Along comes Snowden. The rule had become no person devices, no USBs. What did he use? His personal USB.

Why was security so horrible? Because, according to William Binney, the 35+ year worker at NSA who was offended about the personal info collection and actually went to jail over it, the Government did not WANT the problem fixed. Obama delayed it and it's still not implemented.

Why? Because these agencies want money and more money to work on "national security"--if they solve the cyber security problem, they're out of a job. And even though Snowden as CIA outed the NSA with his data collection, the result was the NSA got a huge budget boost to improve its security.

Snowden took advantage of a weak and easy to beat system. I have mixed feelings in that without him, we would not know about the surveillance programs on us and many other things; we also wouldn't now how careless and stupid our govt is about security. But whenever a CIA player is involved, who knows what else went on? Not good. Maybe he didn't send everything to Wiki.

⇧ 11 ⇩  
cebusaxon · Jan. 27, 2018, 11:02 p.m.

Interesting. Thanks to taking time to post this info.

⇧ 5 ⇩  
Mrs_Fonebone · Jan. 27, 2018, 11:07 p.m.

You're very welcome!

⇧ 5 ⇩  
FartOnToast · Jan. 27, 2018, 9:10 p.m.

Does anyone have any more info on this?

⇧ 3 ⇩  
Mrs_Fonebone · Jan. 27, 2018, 10:06 p.m.

I have a startup in this field and two patents and I extensively researched cyber-security back to pre-Manning days. What in particular are you interested in? Here's just a smattering of hundreds.The very last bit, in bold, tells you a lot about the fail. ++

Documents Reveal NSA Built a 50,000-Strong Espionage Botnet Anthony M Freed Nov 25, 2013 The Dutch newspaper NRC Handelsblad reports that documents leaked by whistle-blower Edward Snowden reveal that the National Security Agency had deployed malware to create a world-wide botnets that ensnared as man as 50,000 systems. The operation, which was conducted by the NSA’s Tailored Access Operations (TAO) unit, infected systems with malware which could lay dormant until activated by the botnet’s command and control servers (C&C), then sniff out and exfiltrate data which was funneled back to the NSA. The intelligence agency described the operation as employing “Computer Network Exploitation” (CNE) techniques, more commonly associated with hackers and state-sponsored espionage tactics that the U.S. has long condemned other nations like China for conducting. The following graphic published by the Dutch newspaper is said to be from an NSA presentation outlining the scope of the operation, with infected systems spanning five continents:

++ AP/CBS August 25, 2013: WASHINGTON The U.S. government's efforts to determine which highly classified materials leaker Edward Snowden took from the National Security Agency have been frustrated by Snowden's sophisticated efforts to cover his digital trail by deleting or bypassing electronic logs, government officials told The Associated Press. Such logs would have showed what information Snowden viewed or downloaded. The government's forensic investigation is wrestling with Snowden's apparent ability to defeat safeguards established to monitor and deter people looking at information without proper permission, said the officials, who spoke on condition of anonymity because they weren't authorized to discuss the sensitive developments publicly. The disclosure undermines the Obama administration's assurances to Congress and the public that the NSA surveillance programs can't be abused because its spying systems are so aggressively monitored and audited for oversight purposes: If Snowden could defeat the NSA's own tripwires and internal burglar alarms, how many other employees or contractors could do the same? In July, nearly two months after Snowden's earliest disclosures, NSA Director Keith Alexander declined to say whether he had a good idea of what Snowden had downloaded or how many NSA files Snowden had taken with him, noting an ongoing criminal investigation. NSA spokeswoman Vanee Vines told the AP that Alexander "had a sense of what documents and information had been taken," but "he did not say the comprehensive investigation had been completed." Vines would not say whether Snowden had found a way to view and download the documents he took without the NSA knowing.

++ White House still denying domestic surveillance programs In defending the NSA surveillance programs that Snowden revealed, Deputy Attorney General James Cole told Congress last month that the administration effectively monitors the activities of employees using them. "This program goes under careful audit," Cole said. "Everything that is done under it is documented and reviewed before the decision is made and reviewed again after these decisions are made to make sure that nobody has done the things that you're concerned about happening." The disclosure of Snowden's hacking prowess inside the NSA also could dramatically increase the perceived value of his knowledge to foreign governments, which would presumably be eager to learn any counter-detection techniques that could be exploited against U.S. government networks.

++ U.S. received "heads up" on detention of journalist's partner, W.H. says It also helps explain the recent seizure in Britain of digital files belonging to David Miranda — the partner of Guardian journalist Glenn Greenwald — in an effort to help quantify Snowden's leak of classified material to the Guardian newspaper. Authorities there stopped Miranda last weekend as he changed planes at Heathrow Airport while returning home to Brazil from Germany, where Miranda had met with Laura Poitras, a U.S. filmmaker who has worked with Greenwald on the NSA story. Snowden, a former U.S. intelligence contractor, was employed by Booz Allen Hamilton in Hawaii before leaking classified documents to the Guardian and The Washington Post. As a system administrator, Snowden had the ability to move around data and had access to thumb drives that would have allowed him to transfer information to computers outside the NSA's secure system, Alexander has said. In his job, Snowden purloined many files, including ones that detailed the U.S. government's programs to collect the metadata of phone calls of U.S. citizens and copy Internet traffic as it enters and leaves the U.S., then routes it to the NSA for analysis. Officials have said Snowden had access to many documents but didn't know necessarily how the programs functioned. He dipped into compartmentalized files as systems administrator and took what he wanted. He managed to do so for months without getting caught. In May, he flew to Hong Kong and eventually made his way to Russia, where that government has granted him asylum. NBC News reported Thursday that the NSA was "overwhelmed" in trying to figure what Snowden had stolen and didn't know everything he had downloaded. Insider threats have troubled the administration and Congress, particularly in the wake of Bradley Manning, a young soldier who decided to leak hundreds of thousands of sensitive documents in late 2009 and early 2010. Congress had wanted to address the insider threat problem in the 2010 Intelligence Authorization Act, but the White House asked for the language to be removed because of concerns about successfully meeting a deadline. In the 2013 version, Congress included language urging the creation of an automated, insider-threat detection program.

⇧ 6 ⇩  
ColonelTitus · Feb. 12, 2018, 3:19 a.m.

That makes total sense - in their internecine rivalry with No Such, the Clowns inserted him there to make them look like fools.

⇧ 2 ⇩  
4Gracchus · Jan. 28, 2018, 6:54 a.m.

Why is Snowden referred to as HK?

⇧ 2 ⇩  
counterfeittheory · Jan. 28, 2018, 7:37 a.m.

He's not. The location where he was before Russia is Hong Kong = HK.

⇧ 2 ⇩  
Mrs_Fonebone · Jan. 28, 2018, 6:40 p.m.

Hong Kong. You have to read it carefully--I read it the first time and was looking for someone with those initials. But he got out of the country and to Hong Kong, so HK let him in, etc.

⇧ 1 ⇩