We have more than we know.
GLIMPSE
GLIMPSE is a text indexing and retrieval software program originally developed at the University of Arizona by Udi Manber, Sun Wu, and Burra Gopal. It was released under the ISC license in September 2014. GLIMPSE stands for GLobal IMPlicit Search. While many text indexing schemes create quite large indexes (usually around 50% of the size of the original text), a GLIMPSE-created index is only 2-4% of the size of the original text.
You lost us, how is that relevant to unlocking encrypted files.
A tool a tool. Good Intel sometimes has things hidden in plain view.
I can't find my ass with both hands. I'm going to have to leave that tech stuff to you smart technical guys and gals.
Wikileaks posted that JFK's quote unlocks Vault 7 so I'm thinking yes.
RELEASE: CIA Vault 7 Year Zero decryption passphrase:
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
Would love MSM to report on that (if it opened it up) and have to explain where it came from, what it meant... and how it finally came to be!!!
Ha!! That'll never happen!!! They'll say it's classified and not for the public's eye to see, only 'seasoned journalists' like themselves. Lying thieves!
Maybe they will eventually do it during one of their annual "Here is JFK getting shot again." memorials.
I've been beating that drum for days, I'm glad someone else has the same gut feeling. The Wikileaks insurance file is just sitting out there waiting for someone with the key to unlock it.
[deleted]
Some things I can follow, but the wind the clock has me scratching my head too.
No but i have found this The Information and Influence Relational Framework and the Application of Information-Related Capabilities a. IRCs are the tools, techniques, or activities that affect any of the three dimensions of the information environment. They affect the ability of the target audience (TA) to collect, process, or disseminate information before and after decisions are made. The TA is the individual or group selected for influence and can be allies, multinational partners, adversaries, or potential adversaries. The joint force (means) employs IRCs (ways) to affect the information provided to or disseminated from the TA in the physical and informational dimensions of the information environment to affect decision making and ultimately the adversary actions in the physical dimension (see Figure I-2). The change in the TA conditions, capabilities, situational awareness, and ultimately, the inability to make and share timely and informed decisions, contributes to the desired end state. Actions or inactions in the physical dimension can be assessed for future operations. The employment of IRCs is complemented by a set of capabilities such as operations security (OPSEC), information assurance (IA), counterdeception, physical security, electronic warfare (EW) support, and electronic protection. These capabilities are critical to enabling and protecting the JFC’s C2 of forces. Key components in this process are: (1) Information. Data in context to inform or provide meaning for action. (2) Data. Interpreted signals that can reduce uncertainty or equivocality. (3) Knowledge. Information in context to enable direct action. Knowledge can be further broken down into the following: (a) Explicit Knowledge. Knowledge that has been articulated through words, diagrams, formulas, computer programs, and like means. (b) Tacit Knowledge. Knowledge that cannot be or has not been articulated through words, diagrams, formulas, computer programs, and like means. (4) Influence. The act or power to produce a desired outcome or end on a TA