-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 OH yes indeed.. I wonder just where the NSA versions of MS Office have ended up.. I would speculate at some very exotic locations... Regards AT On 05/09/14 20:31, John Young wrote: > Imperceptible tracing tags, and/or false files, are placed in > sensitive data repositories as well as inside some of the files in > order to be able to trace them. This is done also in cryptosystems > and other security devices. They may be hidden, open, semi-hidden > to be discovered as decoys, timed to be released variously over a > period of time, sometimes quite lengthy, sometimes triggered by > geo-location as well. > > The more sensitive the data the more intricate the traces, traps, > pointers, deception, ruses, decoys, ploys, gambits, and so on. No > sensitive data, comsec system or espionage means and methods is > without them. > > These are somewhat similar to what literary forensic specialists > use to track plagiarism and forgeries but considerable more > devious. Very long history of these, on the bitter lessons of > expected betrayal. > > This is not to overlook that Snowden may have deployed his own > trackers to trace where his free gift was distributed and to > double check the recipients honestry and fidelity, knowing that > turncoats are easily manufactured by persuasion, pressure, ego and > as always, money. > > Snowden may well have advised recipients to deploy trackers of > their secondary recipients. And so on. > > Bear in mind that Snowden was trained by the CIA in humint and > technicla tradecraft and worked for the agency for years before > his brief employment with NSA contractors. Nothing of the CIA > databases and tradecraft to which he had access has been released. > Reported rationale for this is that he does not want to endanger > CIA officers. Odd distinction between two closely wedded agencies, > although they are said to be like two scorpions in a bottle which > consider one another as the number one enemy. > > > At 02:24 PM 9/5/2014, you wrote: >> How would disinformation be inserted in Snowden's downloads? Can >> you be more specific about the mechanism? > > > -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJUChGTAAoJECmQp9fB4zqeUBgP/RBf5H+I2yF0Ck4rPOOV1m9I wzx0nNhHP67/cPmOUyaAoqTbLFGVTYLlfhNBmDNBf+AgSXRChUQ+crEgwW/ZnHvL A/Ko1vE/RhJCy+bw6O3TuQwTpeFINgIIrAvkacPc0DyDU4hDlVF88LYOEYOuztuQ m7IFrpgm+NROI0kG+nOKnxhQWboA9Iu5iTtO/uWcyo4yxPzKkX/PFL+yjTmWtgbx 4b4YnAWJ7p4Sf+soRtoOAH/GVJMfmxk4XBkBDRf23/PQ1S/pGeyiYPFuPtfvgAq6 ILl6MmMx1eZsDihZzRehxKYVVwBkvsm0Mnu7RRiVyqm/FaSmFYGcJXl1qJ1EBP02 fRrOBQfRQPYy6dODxKpyGGHfgA5w2F0OLwfKfNiaoS3BDzKskYTodVsy2RgX7Ax5 pqUv2SMTGmlSiQjijc5VMPM5gUk6HhCPdz01Ec2ycob1WIZbLoO5JgLWg3po699O dCv0RnmX6PXhI3DT/FyIyRyv/vKRkxColkx00e8qpi0qyV9C8KOsXouKIgAqxh9/ Rp0sh7bNH1roFZT/PaE14b/bxz22tnAmGbTYqxZNjuAIsvRGxt3zQTPqeW9IbYq8 FOyNzl5iAKDh3Re8/5OTmBS862nwZKIAAlW1KBShCeLX95uVHn6+i2+zCw9MeD46 qlsMCTeuJ5qKnxCIXzmh =WWvm -----END PGP SIGNATURE-----