[cryptome] Re: Ask Zelda

  • From: John Young <jya@xxxxxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Fri, 05 Sep 2014 15:31:53 -0400

Imperceptible tracing tags, and/or false files, are placed in sensitive
data repositories as well as inside some of the files in order to be
able to trace them. This is done also in cryptosystems and other
security devices. They may be hidden, open, semi-hidden to be
discovered as decoys, timed to be released variously over a
period of time, sometimes quite lengthy, sometimes triggered by
geo-location as well.

The more sensitive the data the more intricate the traces, traps,
pointers, deception, ruses, decoys, ploys, gambits, and so on.
No sensitive data, comsec system or espionage means and methods
is without them.

These are somewhat similar to what literary forensic specialists
use to track plagiarism and forgeries but considerable more devious.
Very long history of these, on the bitter lessons of expected betrayal.

This is not to overlook that Snowden may have deployed his own
trackers to trace where his free gift was distributed and to double
check the recipients honestry and fidelity, knowing that turncoats
are easily manufactured by persuasion, pressure, ego and as
always, money.

Snowden may well have advised recipients to deploy trackers
of their secondary recipients. And so on.

Bear in mind that Snowden was trained by the CIA in humint and
technicla tradecraft and worked for the agency for years before his
brief employment with NSA contractors. Nothing of the CIA
databases and tradecraft to which he had access has been
released. Reported rationale for this is that he does not want
to endanger CIA officers. Odd distinction between two closely
wedded agencies, although they are said to be like two scorpions
in a bottle which consider one another as the number one enemy.


At 02:24 PM 9/5/2014, you wrote:
How would disinformation be inserted in Snowden's downloads? Can you be more specific about the mechanism?



Other related posts: