PDA

View Full Version : GCHQ, Snowden and 'dirty tricks'.



Lee
02-27-2014, 07:42 PM
This week we finally get to see a (partially) UFO related document released from the so called Snowden Archive. (Leaked documents from NSA whistleblower Edward Snowden.) The papers have been published in full at "The Intercept", a website dedicated to Edward Snowden's controversial material.

The document in question is a PowerPoint presentation from the UK Government Communication Headquarters' (GCHQ) formerly secret, Joint Threat Research Intelligence Group (JTRIG) entitled; “The Art of Deception: Training for Online Covert Operations.”

Of particular interest to us here is the inclusion of three UFO images, unfortunately there is no explanation or related text due to the nature of the document (Powerpoint). However, given the subject matter of the presentation the inclusion of UFO images has some very intriguing implications.

Independent journalist Glenn Greenwald writes: "Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that."

Read the article and the complete document at the links below:

https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/

Direct link to the complete GCHQ PowerPoint presentation:

https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/

Pandora'sParadox
02-27-2014, 08:47 PM
Outstanding topic.

Having majored in Psy, and a background in military...this powerpoint has Central Intelligence written all over it. It uses the exact implications as described in the graphs throughout the powerpoint to focus on the reader at an individual level. I can also see the layout of how it is presented. At first, if in chronological order, certain subtle references are given to manipulate the mind to focus on "one". Then, it moves to group, then community...and so forth until it reads on a global scale. I can tell that there have been some slides removed, but following the pattern...those ufo pics are right were they should be.
I just have a few ideas to bounce off anyone willing...
*In reference to the top of the slides. (Ref to USA FVEY) What is FVEY?
http://cryptome.org/2013/09/nsa-bullrun-2-16-guardian-13-0905.pdf
It also appears across this document about the NSA for "Bullrun"

*Im interested to know what the 3 distinct references on pg 16 are in reference to. More info on these individuals is needed...
As well as the tank photo with soldiers. (I believe this is a doctored photo that these internet magicians use.)

*False flag= 9-11? (BTW, the reference to classified declassification is completely accurate. 25...50...70 yrs kind of thing.)

*My last perplexity...Looong story short. In reference to pg 49. Certain operations require certain lvls of clearance...when "one" goes through "top secret" clearance...its a very demanding process. The 25 remaining, were separated into 2 groups. "One" did not have a code stamp in the top right corner...so he stood to the left. His friend "two" had Operation Blowtorch stamped in the corner. There were 4...that's it. They left, never said anything about it again. Seeing how this fits the sort of time frame as early 2013, I'm wondering if there's relevance. ("Ones" lvl was pretty high, so "two's topped that apparently.) Googling this...I find nothing. which fits... :doh:

Thanks for your info.

\ \/ /

Pandora'sParadox
02-27-2014, 10:57 PM
I read this yesterday, but it wasn't in the right spot. Now a day later, you've made a thread about it. Lol.
http://www.educatinghumanity.com/2014/01/Iranian-UFO-Disclosure-ET-Setting-US-Policy.html

:ufo:

p.s. I understand that it is an inflatable tank...just throwing that out there. :doh:

http://en.wikipedia.org/wiki/Ghost_Army

Pandora'sParadox
02-27-2014, 11:06 PM
and... Snowden points out that the E.T.s have been in Nevada, helping our tech.

Where is the one place on Earth were the USAF trains drone pilots?


:das

Longeyes
02-27-2014, 11:20 PM
Would love to hear the lecture that went with it.
Appears a very well thought out and researched presentation.
Is one of the UFO photos genuine the other two fake? One is certainly a bird.

I hope Snowden had access to some of the better stuff. But fear it'll be the last thing he releases; he needs to hold something back to remain safe. Hasn't he stashed copies with people so if he's killed they will release all?

CasperParks
02-27-2014, 11:36 PM
Following Disclosure, this type of stuff will get worse. Expect partial truths, laced with lies and deceit.

Doc
02-28-2014, 01:26 AM
Would love to hear the lecture that went with it.
Appears a very well thought out and researched presentation.
Is one of the UFO photos genuine the other two fake? One is certainly a bird.

I hope Snowden had access to some of the better stuff. But fear it'll be the last thing he releases; he needs to hold something back to remain safe. Hasn't he stashed copies with people so if he's killed they will release all?

The one that looks bird-like also looks like an object in a video that Gordon Novell was showing people on a laptop he was carrying around at one of the first Crash Retrieval Conferences I attended in Las Vegas. I was still smoking back then and Gordon and I bumped into each other a few times in the little smoking area outside the conference hall. We began recognize each other, share a light or a smoke and we began to talk. I believe he said it was either a crashed saucer that had been repaired and test flown or a back-engineered duplicate of a crashed saucer. At the time he was raising funds for a group that was planning build a replica of a saucer like that for research and sales. He was a fascinating guy, always neatly dressed in a light-colored suit and tie, spoke quietly and although he was slight in stature he looked like a very tough fellow indeed under that suit.

Lee
02-28-2014, 08:42 AM
Outstanding topic.

Having majored in Psy, and a background in military...this powerpoint has Central Intelligence written all over it. It uses the exact implications as described in the graphs throughout the powerpoint to focus on the reader at an individual level. I can also see the layout of how it is presented. At first, if in chronological order, certain subtle references are given to manipulate the mind to focus on "one". Then, it moves to group, then community...and so forth until it reads on a global scale. I can tell that there have been some slides removed, but following the pattern...those ufo pics are right were they should be.
I just have a few ideas to bounce off anyone willing...
*In reference to the top of the slides. (Ref to USA FVEY) What is FVEY?
http://cryptome.org/2013/09/nsa-bullrun-2-16-guardian-13-0905.pdf
It also appears across this document about the NSA for "Bullrun"

*Im interested to know what the 3 distinct references on pg 16 are in reference to. More info on these individuals is needed...
As well as the tank photo with soldiers. (I believe this is a doctored photo that these internet magicians use.)

*False flag= 9-11? (BTW, the reference to classified declassification is completely accurate. 25...50...70 yrs kind of thing.)

*My last perplexity...Looong story short. In reference to pg 49. Certain operations require certain lvls of clearance...when "one" goes through "top secret" clearance...its a very demanding process. The 25 remaining, were separated into 2 groups. "One" did not have a code stamp in the top right corner...so he stood to the left. His friend "two" had Operation Blowtorch stamped in the corner. There were 4...that's it. They left, never said anything about it again. Seeing how this fits the sort of time frame as early 2013, I'm wondering if there's relevance. ("Ones" lvl was pretty high, so "two's topped that apparently.) Googling this...I find nothing. which fits... :doh:

Thanks for your info.

\ \/ /
I believe "FVEY" means 'FIVE EYES' and refers to the intelligence pact between the UK, USA, Canada New Zealand and Australia. It used to be known as the UKUSA agreement.

ProblemChild
02-28-2014, 08:46 AM
Would love to hear the lecture that went with it.
Appears a very well thought out and researched presentation.
Is one of the UFO photos genuine the other two fake? One is certainly a bird.

I hope Snowden had access to some of the better stuff. But fear it'll be the last thing he releases; he needs to hold something back to remain safe. Hasn't he stashed copies with people so if he's killed they will release all?

The seagull poo one has been widely discounted. The balloon video still is from Arturo Robles Gil who if you google him has had many encounters with these objects! The other picture is Dean Morgan UFO, never seen an answer either way.

Does this mean that the lecture was about the misidentification of objects or hoaxing?

Lee
02-28-2014, 08:52 AM
Would love to hear the lecture that went with it.
Appears a very well thought out and researched presentation.
Is one of the UFO photos genuine the other two fake? One is certainly a bird.

I hope Snowden had access to some of the better stuff. But fear it'll be the last thing he releases; he needs to hold something back to remain safe. Hasn't he stashed copies with people so if he's killed they will release all?
I'd like to have heard the lecture too. ; )

As for the photos, I suspect they're all public domain and agree that the last one is a bird in flight, in fact I think we might have covered it at OMF. Next stage is to identify the source of those images, the first has a date and location, the second is obviously stills from a video and has a name so it shouldn't be difficult. (I almost expected to see the cali drones in there... )

As for the documents themselves, my understanding is that they are in the possession of journalists and it is them, not Snowden that are responsible for their publication.

Lee
02-28-2014, 09:03 AM
Thanks, PC. Hadn't seen your post.

I don't think the lecture was about identifying hoaxes, given the subject matter and context. That section could have been about perception and information management perhaps?

Longeyes
02-28-2014, 01:04 PM
I'd like to have heard the lecture too. ; )

As for the photos, I suspect they're all public domain and agree that the last one is a bird in flight, in fact I think we might have covered it at OMF.

.

Ah yes wasn't it a Cornish seagull?. Will have a dig tonight.

The presentation seems to be aimed at taking out or destroying, groups or individuals. How belief systems work and how easy they are to undermine.
Magicians and how to hide stuff in the open if you look like the surroundings are expected to be there. Lots of ufo photos like the seagull people go ' I never saw anything then' because a seagull would be a natural part of the scenery.

That maybe why a couple of the photos were used?

Pandora'sParadox
02-28-2014, 01:28 PM
...If you were the reporter, and received all this information...

The info states that we have been under galactic rule for the past 30 yrs and proved that our religious beliefs are false and everytime our civilization starts to thrive, it is reset to keep us on this planet.

Would you tell the public?

kingfish
02-28-2014, 02:13 PM
FVEY stands for “five eyes,” a restriction limiting disclosure of information to officials of the U.S. and four key allies who cooperate closely with NSA: Australia, Canada, New Zealand, and the United Kingdom. - See more at: http://www.darkgovernment.com/news/x-nsa-employee-retained-above-top-secret-information-on-home-computer/#sthash.9INO8vBx.dpuf


[QUOTE=Pandora'sParadox;30419]Outstanding topic.

I just have a few ideas to bounce off anyone willing...
*In reference to the top of the slides. (Ref to USA FVEY) What is FVEY?
http://cryptome.org/2013/09/nsa-bullrun-2-16-guardian-13-0905.pdf
It also appears across this document about the NSA for "Bullrun"


*My last perplexity...Looong story short. In reference to pg 49. Certain operations require certain lvls of clearance...when "one" goes through "top secret" clearance...its a very demanding process. The 25 remaining, were separated into 2 groups. "One" did not have a code stamp in the top right corner...so he stood to the left. His friend "two" had Operation Blowtorch stamped in the corner. There were 4...that's it. They left, never said anything about it again. Seeing how this fits the sort of time frame as early 2013, I'm wondering if there's relevance. ("Ones" lvl was pretty high, so "two's topped that apparently.)

Hey Pandora- please elaborate on this. BTW-Looks like "Bullrun" is a compartment to itself.

the kingfish

Doc
02-28-2014, 03:55 PM
...If you were the reporter, and received all this information...

The info states that we have been under galactic rule for the past 30 yrs and proved that our religious beliefs are false and everytime our civilization starts to thrive, it is reset to keep us on this planet.

Would you tell the public?

That is argument often used by the Black Hat faction to stifle disclosure efforts here and there--but they often put forth the reasoning through surrogates. We'll hear, "The reason disclosure is opposed is that our utter helplessness can't be revealed lest faith in govt to protect us will be destroyed or that there is a Dark Message so terrible that any public knowledge of it would cause chaos far beyond the panic that was predicted 60 years ago.

Edward
02-28-2014, 10:57 PM
Well here is my feeling on all that. I feel that It's Either A. We are indeed under rule of some other force that we do not as a whole acknowledge( Could be alien could be UT could be humans or something else) Or B. The so called ruling elite( the greedy of power, money and information in nature that they are) Keep the machine going by manipulating and pulling the strings and setting things into motion that keeps their true adjenda secret all the while keeping the masses fighting each other in some sense all the while providing them with all the money and wealth they want. Now it It may not be as cut and dry as A and B. It could be all the above with other scenario's I have not yet mentioned but I'll leave it at this. Some thing is definitely going on, we are definitely being manipulated and it's all ****** up for everyone else but many do not realize that yet.


Edward

Doc
02-28-2014, 11:40 PM
Well here is my feeling on all that. I feel that It's Either A. We are indeed under rule of some other force that we do not as a whole acknowledge( Could be alien could be UT could be humans or something else) Or B. The so called ruling elite( the greedy of power, money and information in nature that they are) Keep the machine going by manipulating and pulling the strings and setting things into motion that keeps their true adjenda secret all the while keeping the masses fighting each other in some sense all the while providing them with all the money and wealth they want. Now it It may not be as cut and dry as A and B. It could be all the above with other scenario's I have not yet mentioned but I'll leave it at this. Some thing is definitely going on, we are definitely being manipulated and it's all ****** up for everyone else but many do not realize that yet.


Edward


From what I have been told here and the there over the years, by people with varying amounts knowledge and credibility, I think it is B but I would not be surprised that maybe elements of A exist and are factors but still B is the main reason we are kept from disclosure.

Doc
03-01-2014, 12:05 AM
This piece from Alejandro Rojas and Open Minds TV answers some questions (forwarded by Jeff):

"The Intercept article which includes the release of the documents describes their significance:


Over the last several weeks, I worked with NBC News to publish a series (http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite) of articles (http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361) about “dirty trick” tactics (http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091) used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four (http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf) classified (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf) GCHQ (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive2_nbc_document.pdf) documents (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf) presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance (http://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/). Today, we at the Intercept are publishing another new JTRIG document (https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/), in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.


Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Much more to read here: http://www.openminds.tv/ufo-photos-in-latest-release-of-snowden-documents/26201

Pandora'sParadox
03-01-2014, 03:33 PM
This piece from Alejandro Rojas and Open Minds TV answers some questions (forwarded by Jeff):

"The Intercept article which includes the release of the documents describes their significance:


Over the last several weeks, I worked with NBC News to publish a series (http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite) of articles (http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361) about “dirty trick” tactics (http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091) used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four (http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf) classified (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf) GCHQ (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive2_nbc_document.pdf) documents (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf) presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance (http://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/). Today, we at the Intercept are publishing another new JTRIG document (https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/), in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.


Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Much more to read here: http://www.openminds.tv/ufo-photos-in-latest-release-of-snowden-documents/26201




...and this is why i take everything with a grain of salt...No one can tell me what I have and didn't see.
One "disturbing" theory I have, is of snowden being the ultimate dis-info artist of the century. How has he went this long without committing "suicide"? (usually within a couple weeks of going public...right?)

Pandora'sParadox
03-01-2014, 04:01 PM
Hey Pandora- please elaborate on this. BTW-Looks like "Bullrun" is a compartment to itself.

the kingfish

"One" doesn't know much, but what "one" does know...

Is that he went through 16 hrs straight of "tippy top" security clearence checking, and his friend, "two" got different orders.

"one's" job was to run/do computer activities.
"two" was defending...i think. (to the best of "one's" knowledge)

Then, sitting in a fancy room with projectors and some "non-uniformed" gentleman kept telling the "#'s" that, "If you have ever smoked pot, did drugs, lied to us, or did not comply in anyway, the "#'s" would be basically court martial'd.

After alllllll that, the "#'s" received their envelopes.

"One" had normal heading and was asked to step to the left.
"Two" had -Operation Blowtorch- stamped in the upper right corner. He stepped to the right.

From there, One and Two never spoke/saw about orders again...

Long story, "One" is discharged later on, trys to google Op-B.T. Comes up with absolutely nothing, which is not surprising.
Asking around...no one has even came across it.
So...is it still going on/what is it?
The area was computer intell and cyber security.



Thats all "one" will say about the matter...still compiling info. Not ready...:confused:

Pandora'sParadox
03-01-2014, 04:05 PM
What "one" does know also...

Is that the USAF no longer uses flashdrives. LMFAO. I'll disclose if needed...:lmao:

ProblemChild
03-01-2014, 04:23 PM
"One" doesn't know much, but what "one" does know...

Is that he went through 16 hrs straight of "tippy top" security clearence checking, and his friend, "two" got different orders.

"one's" job was to run/do computer activities.
"two" was defending...i think. (to the best of "one's" knowledge)

Then, sitting in a fancy room with projectors and some "non-uniformed" gentleman kept telling the "#'s" that, "If you have ever smoked pot, did drugs, lied to us, or did not comply in anyway, the "#'s" would be basically court martial'd.

After alllllll that, the "#'s" received their envelopes.

"One" had normal heading and was asked to step to the left.
"Two" had -Operation Blowtorch- stamped in the upper right corner. He stepped to the right.

From there, One and Two never spoke/saw about orders again...

Long story, "One" is discharged later on, trys to google Op-B.T. Comes up with absolutely nothing, which is not surprising.
Asking around...no one has even came across it.
So...is it still going on/what is it?
The area was computer intell and cyber security.



Thats all "one" will say about the matter...still compiling info. Not ready...:confused:

http://cryptome.org/af-odans-roxad.htm#04-00

" ODANS 04-00

271926Z DEC 00

FM: SSO USAF//XOIIS//

SUBJECT: EXTENSION OF "PROJECT BLOWTORCH" SUBMISSIONS (ODANS 04-00)

REF (A) ASST SECDEF C3I MEMO, 30 OCT 2000, INTERIM ACCESS TO SCI.

REF (B) ODANS 01-00

REF (C) ASST SECDEF C3I MEMO, 30 MAR 2000, INTERIM ACCESS TO SCI

"PROJECT BLOWTORCH" WAS ESTABLISHED BY REF (C) TO COUNTER THE PROLIFERATION OF INTERIM SCI ACCESSES FOR MILITARY PERSONNEL ASSIGNED TO SERVICE CRYPTOLOGIC ELEMENTS (SCE), DUE TO INVESTIGATIVE DELAYS. REF (A) EXTENDS "PROJECT BLOWTORCH" SUBMISSIONS THROUGH FY01. ALL OTHER SUBMISSION CRITERIA PROVIDED SUBMISSION IN REF (B) STILL APPLIES. IT IS IMPORTANT THAT SUBMISSIONS BE CLEARLY MARKED "PROJECT BLOWTORCH.


AT THE END OF FY 01, THE SITUATION AT DSS WILL BE REVIEWED TO DETERMINE IF INVESTIGATIVE DELAYS HAVE IMPROVED SUFFICIENTLY TO PERMIT THE RETURN OF SCE SSBI’S IN FY02.
THIS MESSAGE COORDINATED WITH HQ AF/XOFI. POC FOR THIS ACTION IS MR. MYRICK, AF/XOIIS, DSN 225-7195. "

Pandora'sParadox
03-01-2014, 04:27 PM
So what I'm getting from this,

Is that it is "maybe" part of snowdens whole "cyber attack" powerpoint section? The delay part???

Interesting... btw, thanks for the link, I've been looking for a while.

Pandora'sParadox
03-01-2014, 04:32 PM
http://www.rense.com/Datapages/vikedata.htm

http://www.rense.com/Datapages/ufodat1.htm

I've had these for a while, thought I might share then.
P.S. The rense.com site was given to me by my "cia nut" friend.

One night he calls me and says, "They got osama dude".
I asked, "How do you know...?"
Him "My rense contact"
Me "Your full of $h1t dude..."click"

That was roughly 11pm ish. Next morning it was all over the news like white on rice.
Now I surf rense. LoL :cool:

Pandora'sParadox
03-01-2014, 04:46 PM
That is argument often used by the Black Hat faction to stifle disclosure efforts here and there--but they often put forth the reasoning through surrogates. We'll hear, "The reason disclosure is opposed is that our utter helplessness can't be revealed lest faith in govt to protect us will be destroyed or that there is a Dark Message so terrible that any public knowledge of it would cause chaos far beyond the panic that was predicted 60 years ago.


There are many arguments used by hat wearing factions to dis-inform. But i get the basis... I know many people, who surround there lives with their religion, routines, white picket fences sort of people. I'm afraid, if done the wrong way, these feeble minded individuals would not be able to handle it...even in this day & age. This is why I believe there should be a section of gov. strictly dedicated to studying ways to "disseminate properly". The Vatican seems to be coming along... basically saying, "We're down with E.T.'s"
I'm just feeling we are moving at too slow of a pace, to catch up to the truth. Once that happens, we have to hold those who are responsible for these lies that have engulfed an entire generation of people.
Then...who do we hold responsible? The perpetrators have already lived and died without repercussions...? I feel who ever holds the position at the time would be held responsible. Because you know...they know. :das

Edward
03-01-2014, 07:22 PM
This piece from Alejandro Rojas and Open Minds TV answers some questions (forwarded by Jeff):

"The Intercept article which includes the release of the documents describes their significance:


Over the last several weeks, I worked with NBC News to publish a series (http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite) of articles (http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361) about “dirty trick” tactics (http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091) used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four (http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf) classified (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf) GCHQ (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive2_nbc_document.pdf) documents (http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf) presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance (http://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/). Today, we at the Intercept are publishing another new JTRIG document (https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/), in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.


Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Much more to read here: http://www.openminds.tv/ufo-photos-in-latest-release-of-snowden-documents/26201



Yeah, I was reading up on that and the GCHQ stuff. Some one doesn't want the truth out. It's becoming more and more obvious even to the casual observer but even more painfully obvious to those who have already took an interest in matters of finding out the truth about, Life, the world, the nature of the universe...ect...ect..ect..

Edward

Longeyes
03-02-2014, 08:19 AM
Nigel Watson, author of the Haynes UFO Investigations has managed to identify all of the photos according to him

“The presentation features three UFO pictures, on slides 35 to 37. The first is a black and white picture of a UFO over Redbud, Illinois, taken on 23 April 1950, the second a screenshot of a UFO video by Arturo Robles Gil filmed in Mexico and the third was taken on 01 August 2011 by a holidaymaker at Black Head, Trenarren near St. Austell, Cornwall,” Watson says.

Found it in the following article.
http://uk.news.yahoo.com/mysterious--flying-saucer--slides-found-in-documents-leaked-by-edward-snowden-063618185.html

CasperParks
03-02-2014, 08:25 AM
Nigel Watson, author of the Haynes UFO Investigations has managed to identify all of the photos according to him

“The presentation features three UFO pictures, on slides 35 to 37. The first is a black and white picture of a UFO over Redbud, Illinois, taken on 23 April 1950, the second a screenshot of a UFO video by Arturo Robles Gil filmed in Mexico and the third was taken on 01 August 2011 by a holidaymaker at Black Head, Trenarren near St. Austell, Cornwall,” Watson says.

Found it in the following article.
http://uk.news.yahoo.com/mysterious--flying-saucer--slides-found-in-documents-leaked-by-edward-snowden-063618185.html

Thanks for the follow-up.

Edgar Fouche
09-27-2014, 02:41 AM
There are a lot of misconceptions about 'Security Clearances.' There are NO levels above Top Secret. Just lateral SAP (Special Access Programs), I had 14 different Air Force Specialty Codes, which the average is one or two. The UFO community is replete with liars who say they have/had security clearances 32 to 40 levels above Top Secret. It's a myth! Sgt. Dean says he had a 'Cosmic' clearance which was 32 levels above Top Secret. Bull S$#@! A NATO Top Secret is called 'Cosmic.' US uses Top Secret and NATO uses Cosmic. Ha... Same thing people! Read on please. Ed Fouche.

Summary

This report provides a primer on some of the fundamental aspects of the security clearance
process, using a “Frequently Asked Questions” format.
A security clearance is a determination that an individual—whether a direct federal employee or a
private contractor performing work for the government—is eligible for access to classified
national security information. A security clearance alone does not grant an individual access to
classified materials. Rather, a security clearance means that an individual is eligible for access. In
order to gain access to specific classified materials, an individual should also have a demonstrated
“need to know” the information contained in the specific classified materials.

There are three levels of security clearances: Confidential, Secret, and Top Secret, which
correspond to the levels of sensitivity of the information that a cleared individual will be eligible
to access. In addition, there are two major categories of classified information that are commonly
associated with the Top Secret level: Sensitive Compartmented Information (SCI), which refers to
intelligence sources and methods, and Special Access Programs (SAPs), which refers to highly
sensitive policies, projects, and programs. These categories exist for classified information that
has been deemed particularly vulnerable. Eligibility standards and investigative requirements for
access to SCI and SAPs are higher than for access to information otherwise classified at the same
level, which further restricts the number of individuals eligible for access.

Federal employees and private contractors must be cleared in order to gain access to classified
materials. An individual may not obtain or initiate a security clearance on his or her own. A
sponsoring federal agency initiates the process and will make the final security clearance
determination based on a background investigation.

Although the process involves a number of stages, four key steps to obtaining and maintaining a
security clearance are (1) agency sponsorship and submission of clearance application materials;
(2) a background investigation, the extent of which may vary by level of clearance; (3) an
adjudication to determine whether an individual will be deemed eligible for access; and (4)
periodic reinvestigations. Adjudication and final clearance determinations are generally made by
the sponsoring agency. To maintain a security clearance, an individual is also subject to periodic
reinvestigations. The frequency of reinvestigations vary by level of clearance.
The Office of Personnel Management, Federal Investigative Services (OPM-FIS) oversees
approximately 90% of all background investigations. Typically, the costs of a background
investigation, including background investigations of private contractors, are paid for by the
requesting agency. While the final determination to grant or deny a security clearance is typically
made by the requesting agency, with certain exceptions a security clearance granted by one
agency may be accepted by other agencies. It is difficult, however, to determine the degree to
which reciprocity occurs between agencies.

This report will be updated as events warrant. Security Clearance Process: Answers to Frequently Asked Questions
Congressional Research Service
Contents
Introduction .................................................. .................................................. .................................. 1
What Is a Security Clearance? .................................................. .................................................. ..... 1
What Is the Difference Between a Security Clearance and a Suitability Check? ............................ 2
What Are the Levels of Security Clearances?....................................... ........................................... 2
Who Is Eligible to Obtain a Security Clearance? .................................................. .......................... 3
Can an Individual Obtain a Security Clearance on His or Her Own?.............................................. 3
Are Constitutional Officers (e.g., the President, Members of Congress) Required to Hold
a Security Clearance to Access Classified Information? .................................................. ............ 4
Are Congressional Staff and Judicial Staff Required to Hold a Security Clearance to Gain
Access to Classified Information? .................................................. .............................................. 4
How Many Individuals Hold Security Clearances in Total and at Each Level? .............................. 5
What Are the Major Aspects of the Security Clearance Process?.......................................... .......... 6
Are Private Contractors Subject to the Same Clearance Process as Direct Government
Employees? .................................................. .................................................. ............................... 7
Which Agencies Are Responsible for Conducting Background Investigations? ............................. 7
Who Pays for Background Investigations? .................................................. .................................... 8
On Average, How Long Does it Take to Obtain a Security Clearance? ........................................... 9
Are There Guidelines or Standards for Approving, Denying, or Revoking a Security
Clearance? .................................................. .................................................. ................................ 9
Can the Outcome of a Security Clearance Determination Be Appealed? ...................................... 10
May a Security Clearance Granted by One Agency Be Accepted by Other Agencies? ................. 11
Tables
Table 1. Security Clearances Approved and Total Clearances Held as of FY2012 ......................... 5

http://www.afio.com/publications/Security_Clearance_Process_Answers_by_CRS_Sept2013 .pdf
Read On:
http://www.afio.com/publications/Security_Clearance_Process_Answers_by_CRS_Sept2013 .pdf

Edgar Fouche
10-02-2014, 10:37 PM
How long does it take to get a security clearance? If the job is a high level government job, it's quicker. It's also faster during wartime. On average a Top Secret clearance in the military takes six to nine months back in my day (70s-80s). Security clearance police has been totally revamped and sped up over the last couple of decades since 1990. You see the results of the streamlining... Lots of leakers, disclosers, and whistle-blowers now! However since the Snowden/Assage/Manning feasco... The time to get a Top Secret clearance is getting longer and longer.

Edgar Fouche

How long does the process take?

http://www.taonline.com/securityclearances/#SCREQ

In the past three years, DoD has had a significant backlog of security clearances and reinvestigations pending, most especially for TOP SECRET level access. In general, expect a CONFIDENTIAL or SECRET clearance to take between 1 and 3 months. A TOP SECRET clearance commonly takes more than a year.
TOP SECRET:
Individuals with this clearance have access to information or material that could be expected to cause exceptionally grave damage to the national security if it was released without authorization. This level needs to be reinvestigated every five years.

http://2.bp.blogspot.com/-21l9ANxr5Mo/T81tsezouEI/AAAAAAAAEiI/pc9Pnt5jxLM/s320/topsecret.jpg

On Average, How Long Does it Take to Obtain a Security Clearance?

The ODNI’s 2012 Report on Security Clearance Determinations provides data on the longest and
shortest security clearance processing times for each element of the intelligence community.40 For
FY2012, the longest processing time for the fastest 90% of Top Secret security clearance cases—
from initiation to adjudication decision—ranged from 73 days for the Department of State to 454
days for the CIA. For Secret or Confidential Clearances, the longest processing time for the
fastest 90% ranged from 56 days for the Department of State to 500 days for the CIA.

The ODNI’s IRTPA Title III Annual Report for 2010 provides average processing times, and notes
that “overall, the government has continued to show a significant improvement in security
clearance processing times, reducing the combined investigative and adjudicative processing time
from an average of 165 days in 2006 to an average of 53 days in the 4th [quarter of] FY 2010 for
the fastest 90% of initial security clearances government-wide.”41

http://www.afio.com/publications/Security_Clearance_Process_Answers_by_CRS_Sept2013 .pdf