17 November 2012
Read a piece about and by you, dealing with the General's email. I believe
he and the girl used the dodge of opening accounts (gmail) and sharing passwords
etc so that each could read drafts in computer emails but that the emails/s
did not go into cyberspace.
Correct, but that evasion is well-known and quite accessible by security
experts. Cyberspace includes personal computers and handhelds and cellphones.
If you are on a network you are spyable. If you use a digital device your
signals are capturable.
You know this better than me.
Broadwell learned all this at intel training at Fort Huachuca. Petraeus should
have been briefed as general and as CIA head. The story stinks of deceptive
ploy, SOP for counter-intel.
At 09:18 AM 11/17/2012, you wrote:
17 November 2012
It is an enigma that the Petraeus, Broadwell, Allen and Kelley emails escaped
the vast apparatus of NDI, CIA, NSA , DIA and commercial spying and
data-aggregating firms for electronic spying and counterspying (as well of
that of other nations).
Either the billion-dollar systems failed to meet panoptic expectations or
there was a deliberate overlook of senior officials, or a cover-up, before,
during and after the email exchanges.
The emails are sitting in a secret archive(s) of NSA and its emulators
to remain forever along with a cornucopia of emails ready to be harvested
as need arises.
This capability will remain secret, cloaked by a slew of pre-positioned tales
to divert attention based on privacy protection, sex, bribery, crime,
technical glitches, hackers, leakers, cyberattacks from bountiful enemies,
and the all-time exculpation, nobody informed those supposedly overseeing
the global governmental and commercial spying operations.
Maybe once a generation one of the lower-level operators of the systems will
be asked a direct question and a direct answer will be given to the public,
but if that is done without approval of secrets-keeping authority and commercial
legal counsel the outcome will be a job and pension loss, vindictive trial,
fine and time in jail.
Alternatively it can be sold to an enemy or commercial competitior for a
hero's welcome and lifetime pension, as spy agencies and commercial firms
perennially dangle just that bait.
What else was snatched and peddled of the streams used by Petraeus, Broadwell,
Allen and Kelley, is sitting in an NSA vault as well as several other government,
commercial and institutional aggregators.
To become informed about the potential of these systems consider signing
up for a brand new spy service called, aptly, Enigma:
From: Enigma Team <no-reply[at]enigma.io>
Subject: Welcome to Enigma
Date: Fri, 16 Nov 2012 16:16:53 -0500
You are invited to set up a trial account on Enigma. To complete the registration
process and create a password, please click on the following link:
Please don't hesitate to contact us with any questions you may have. Thank
you, The Enigma Team
Enigma centralizes and connects thousands of previously siloed public databases.
Rapidly browse, query, perform on-screen analytics, and discover related
datasets from a single portal.
Enigma puts the world's most valuable databases at your fingertips. Seamlessly
search, filter, analyze, export, and isolate.
Seeing is believing
We didn't pull the world's data just for fun.
Check it out.
Request free trial