Imperceptible tracing tags, and/or false files, are placed in sensitive data repositories as well as inside some of the files in order to be able to trace them. This is done also in cryptosystems and other security devices. They may be hidden, open, semi-hidden to be discovered as decoys, timed to be released variously over a period of time, sometimes quite lengthy, sometimes triggered by geo-location as well. The more sensitive the data the more intricate the traces, traps, pointers, deception, ruses, decoys, ploys, gambits, and so on. No sensitive data, comsec system or espionage means and methods is without them. These are somewhat similar to what literary forensic specialists use to track plagiarism and forgeries but considerable more devious. Very long history of these, on the bitter lessons of expected betrayal. This is not to overlook that Snowden may have deployed his own trackers to trace where his free gift was distributed and to double check the recipients honestry and fidelity, knowing that turncoats are easily manufactured by persuasion, pressure, ego and as always, money. Snowden may well have advised recipients to deploy trackers of their secondary recipients. And so on. Bear in mind that Snowden was trained by the CIA in humint and technicla tradecraft and worked for the agency for years before his brief employment with NSA contractors. Nothing of the CIA databases and tradecraft to which he had access has been released. Reported rationale for this is that he does not want to endanger CIA officers. Odd distinction between two closely wedded agencies, although they are said to be like two scorpions in a bottle which consider one another as the number one enemy. At 02:24 PM 9/5/2014, you wrote:
How would disinformation be inserted in Snowden's downloads? Can you be more specific about the mechanism?