[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
What if my hypothesis regarding Snowden is correct?
- Subject: What if my hypothesis regarding Snowden is correct?
- From: g2s at riseup.net (g2s)
- Date: Sun, 18 Jun 2017 15:07:02 -0700
Sent from my Verizon, Samsung Galaxy smartphone
-------- Original message --------From: Steve Kinney <admin at pilobilus.net> Date: 6/18/17 1:24 PM (GMT-08:00) To: Cc: cypherpunks at lists.cpunks.org Subject: Re: What if my hypothesis regarding Snowden is correct?
On 06/18/2017 04:18 PM, Wilfred L. Guerin wrote:
> "Snowed-In @ Moskow" "David Miranda Writes" "Manning the Deck" FBI CI
> 101. Same DIA + FBI unit managed and papered those stupid staged events
> and hundreds more. "Reality Winner"???
> To date I have seen no indications that > Manning was set up.
Adrian Llamo set him up. A database hacker with a debt to credit card companies as restitution for a hack bust
Rr
 In terms of
impact, Snowden and (especially) Winner could be said to have advanced
IC agendas and objectives. Manning not so much: Those leaks caused
numerous diplomatic incidents with the U.S. a clear loser, and got U.S.
forces kicked out of Iraq for quite a while.
The timing of the PRISM release to remove Manning's trial from the news
is also an indicator of sorts.
:o)
> On Sunday, June 18, 2017, Steve Kinney <admin at pilobilus.net
> <mailto:admin at pilobilus.net>> wrote:
>
>Â Â Â Â On 06/18/2017 02:24 AM, Ryan Carboni wrote:
>
>Â Â Â Â > The hypothesis being that Snowden is at least a triple agent. Ali
>Â Â Â Â > Mohammed provided material support to Al Qaeda, but that was
>Â Â Â Â because he
>Â Â Â Â > betrayed both the Army and Al Qaeda for the CIA. His sentencing
>Â Â Â Â has been
>Â Â Â Â > on hold for a long time, and it is interesting no one asks questions
>Â Â Â Â > about it.
>
>Â Â Â Â My guess is that Snowden was an unwitting agent, spotted early by the
>    insider threat program and selected for use in a limited hangout. If
>Â Â Â Â so, he was exposed to scripted events in the workplace to draw his
>Â Â Â Â attention to specific programs, and given e-z access to selected
>    documents related to those programs. In the network age, censorship
>Â Â Â Â ranges from difficult to impossible depending on the context; getting
>Â Â Â Â ahead of an adversary and dominating the messaging on a given topic has
>    gained a new importance. I think the Snowden Affair may be an example.
>
>Â Â Â Â Glenn Greenwald's behavior, selecting a few of Snowden's documents to
>    publish and burying the rest, is consistent with this model. So too is
>Â Â Â Â his initiative in pushing the publication date of the (partially
>Â Â Â Â falsified) PRISM pages back to coincide with the first day of the
>Â Â Â Â Manning trial, knocking it all the way out of the news.
>
>Â Â Â Â The huge controversy following the release of the first few Snowden
>    documents produced what results? It seems that the intel guys won every
>Â Â Â Â engagement, even setting a precedent that senior U.S. intelligence
>Â Â Â Â officials are allowed to lie to Congressional committees under oath with
>    no penalty of any kind. The way it all went down suggests to me that
>Â Â Â Â the intel guise had a long lead time to select and prepare for specific
>Â Â Â Â challenges.
>
>Â Â Â Â > Snowden's revelations increased the amount of encryption.
>
>Â Â Â Â The only place I saw that happen was a significant bump in the use of
>    SSL by a wider range of website operators. Given that the SSL key
>Â Â Â Â signing protocol is deeply flawed and the NSA is uniquely well
>Â Â Â Â positioned to conduct MITM attacks negating that particular form of
>    encryption, no harm done. The result is an increase in end users'
>Â Â Â Â "false sense of" security - and a small net gain in "national security"
>Â Â Â Â in the sense of making access to network traffic a little harder for
>Â Â Â Â foreign intel and private sector criminal enterprises.
>
>Â Â Â Â A casual observer might believe that the Snowden docs caused significant
>Â Â Â Â harm to U.S. interests, most notably when it was revealed the Angela
>Â Â Â Â Merkel's phones were tapped - but those particular documents came from
>Â Â Â Â an as yet unknown source, probably located in Germany.
>
>    I don't "believe" a word of the above analysis. But I do consider it
>Â Â Â Â more likely than the alternatives I have seen.
>
>
>
>
>
>
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 6093 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20170618/2363b3de/attachment.txt>