[cryptome] Re: Ask Zelda

  • From: Alan Taylor <altaylor06@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Fri, 05 Sep 2014 20:40:23 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

OH yes indeed.. I wonder just where the NSA versions of MS Office have
ended up.. I would speculate at some very exotic locations...

Regards
AT



On 05/09/14 20:31, John Young wrote:
> Imperceptible tracing tags, and/or false files, are placed in
> sensitive data repositories as well as inside some of the files in
> order to be able to trace them. This is done also in cryptosystems
> and other security devices. They may be hidden, open, semi-hidden
> to be discovered as decoys, timed to be released variously over a 
> period of time, sometimes quite lengthy, sometimes triggered by 
> geo-location as well.
> 
> The more sensitive the data the more intricate the traces, traps, 
> pointers, deception, ruses, decoys, ploys, gambits, and so on. No
> sensitive data, comsec system or espionage means and methods is
> without them.
> 
> These are somewhat similar to what literary forensic specialists 
> use to track plagiarism and forgeries but considerable more
> devious. Very long history of these, on the bitter lessons of
> expected betrayal.
> 
> This is not to overlook that Snowden may have deployed his own 
> trackers to trace where his free gift was distributed and to
> double check the recipients honestry and fidelity, knowing that
> turncoats are easily manufactured by persuasion, pressure, ego and
> as always, money.
> 
> Snowden may well have advised recipients to deploy trackers of
> their secondary recipients. And so on.
> 
> Bear in mind that Snowden was trained by the CIA in humint and 
> technicla tradecraft and worked for the agency for years before
> his brief employment with NSA contractors. Nothing of the CIA 
> databases and tradecraft to which he had access has been released.
> Reported rationale for this is that he does not want to endanger
> CIA officers. Odd distinction between two closely wedded agencies,
> although they are said to be like two scorpions in a bottle which
> consider one another as the number one enemy.
> 
> 
> At 02:24 PM 9/5/2014, you wrote:
>> How would disinformation be inserted in Snowden's downloads? Can
>> you be more specific about the mechanism?
> 
> 
> 

-----BEGIN PGP SIGNATURE-----
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=WWvm
-----END PGP SIGNATURE-----

Other related posts: