NSA Spying Relies on AT&T'S "Extreme Willingness to Help"

Steve Kinney admin at pilobilus.net
Sat Aug 22 23:35:22 PDT 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/22/2015 12:49 PM, Softy wrote:
> 
> appears to stand up well.  I believe it's very possible that 
> Snowden never obtained access to the useful and relevant
> technical documents that seem to be missing from his dump:
> 
> http://www.globalresearch.ca/nsa-deception-operation-questions-sur
ro
>
> 
und-leaked-prism-documents-authenticity/5338673
> <http://www.globalresearch.ca/nsa-deception-operation-questions-su
rro%0Aund-leaked-prism-documents-authenticity/5338673>
>
>  :o/
> 
>> 
> This speaks to the success of the SCI model, more than
> anything about Snowden.  He had widespread network access - but
> not specific compartmental access.  I would guess rather than
> risk exposing himself he intentionally didn't (or couldn't)
> attempt an active spoof of credentials needed to gain SCI
> access - which is where the technical details live.  Everything
> I have seen dumped from his trove is purely
> presentational/summary reports handed around between 
> offices/echelons and posted on intranets for dissemination.

My thoughts exactly:  Snowden never left the reservation when he
collected his docs, except in that he copied quite a lot of them
and carried them out.  Reading up on what your internal customers
use the network for is healthy and encouraged behavior for admins
- - up to the point of "sensitive sources and methods."

> 
> In the big picture those details don't change the validity of
> the trove -- any criticism based on the 'lack of code' is
> purely an apologist or diversion tactic.  I think the situation
> speaks for itself: Managerial reporting to higher speaks to
> tech capabilities just as great as actual tech source.
> Similarly, intent is very difficult to discern from knowing
> technical ability, however is readily gleaned from managerial
> planning/status updates - especially at higher echelons.

Ah yup.

Project scopes, code names, and functional descriptions give one a
high level but fairly definitive picture of the systems described.
 Once one knows what they are doing, the how is largely self
explanatory.  The only surprise in the whole Snowden dump is the
scope and depth of U.S. engagement in cyber-spying:  Going from
well founded suspicion to detailed documentary evidence is a
quantum leap, converting knowledge into intelligence.

The extent of Greenwald & Co. cooperation with State authorities,
vs. purely commercial motives, remains an open question.

It may be a coincidence that the first two Big Stories of the
Snowden Saga broke on the same days as the last two major events
in the Manning trial.  Greenwald knocked Chelsea's story right off
the public's radar.  I do believe in coincidences, but I try not
to bet on them, and this one casts a creepy, PsyOps kind of light
on the Snowden business.  The sale of those documents to Pierre
Omidyar also seems a little creepy to me:

http://www.boilingfrogspost.com/2013/12/13/greenwald-omidyar-joint-v
enture-the-blurring-lines-between-being-a-source-being-a-journalist/

One content gap that I find puzzling is the absence of references
in published Snowden docs to what was formerly called Romas/COIN
then Odyssey, a system revealed by the H.B. Gary e-mail dump.
Maybe I missed a description of that program under another name: I
have not been reading everything that comes down the pipe.

Romas/COIN was the name of Uncle Sam's cellular network, smart
phone and social media surveillance and exploitation toolkit from
Hell (see echelon2.org). As a rich source of high quality
collection in regions vital to the National Interest, I am sure
that the NSA taps into this kit's databases and/or work products,
even if it "belongs to" another Service.  Maybe somebody here
recognizes Romas/COIN as somthing appearing under another name in
Snowden docs?

:o)







-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=eVua
-----END PGP SIGNATURE-----



More information about the cypherpunks mailing list