“The idea of becoming “NSA-proof” is just silly. If they want it, they can get it” Joseph Lorenzo Hall

“I’m going to slip up and they’re going to hack me. It’s going to happen” Edward Snowden

All the encryption in the world isn’t going to protect, example given, a computer with a NSA, GCHQ, Unit 8200 or other intelligence agency’s undetectable keylog trojan, trust me. But first, a bit of my story and then onto how (not, actually) to leak:

When I’d exited the U.S. Army in April, 1976, I held a top secret clearance. The only documents I had taken with me were a complete record of my military 201 file. I also had (since) acquired copies of my veterans and social security files. How I’d managed copies of these are a secret, along the lines of Benjamin Franklin’s ‘three people can keep a secret if two of them are dead.’ In this regard, it is worth mentioning I have held information between my ears that has never been spoken of in presence of mobile device, let alone entered into a computer or sent via any email.

Ok, so I can tell how I acquired the social security file, the social security administration fucked up and mailed me my own file. Yes, the original, which I went through with what certain people might have assumed would be great satisfaction, as supposedly I realized I was the censor who’d decide what I could see in my file. Of course I redacted or with-held nothing in my self exam, prior to sending the file on to my attorney who notified the social security administration we were (supposedly) inadvertently in possession of the file and to who should we send it to? A lady at the administration, in subsequent conversation, commented to myself something along the lines of ‘NO ONE has had the access to their file that you have had…’

But in fact this social security business was patent bs. Almost certainly the file had been deliberately sent my way, stripped of certain records (they missed pulling one critical document pointing to this), to throw me off the trail of then senators Max Baucus and Conrad Burns who both were complicit in covering up crimes at United States Forest Service offices in Montana on environmental issues, and suspects in regards to my file having been sequestered for months at the Social Security offices in Maryland while it was investigated whether I could be charged with fraud. Why? The USA appears to have left no stone unturned in efforts to take myself out of the public circulation due to my anti-corruption work of that era (1990s.) Apart from this, it was about this time I’d produced copies of records from my VA (military veteran) file after certain originals had gone missing following an ‘expert’ sent from Washington to Helena (Montana, where my VA file was kept) to ‘review’ files, kept me from charges of fraud relating to my veteran’s disability pension.

This (failed) ‘deep state’ caper in regards to attempt at trumping up felony charges intended to send me to jail and end my work, follows typical false flag spy-craft model. The people hearing the case, had it been successfully pursued, would have been innocents looking at a record they could not know (or believe) had been tampered with, to secure a conviction. My having copies of my VA file documents, saved my butt. I produced the necessary copy of a critical document at the initial hearing and the case was dismissed on the spot.

It wasn’t until I’d dug into the USA’s funding of charter schools as cover for intelligence embeds, the agencies had begun playing hardball or, that is to say, devoted resources to taking me out physically (assassination.)

Prior to this, during my stint with Special Forces, I’d the best possible education in operations and intelligence because it was not school, but OJT (on-the-job-training) with veterans of operations coordinated with CIA in Indochina and Central America. This was the best (or worst, depending on one’s perspective) avenue to knowledge in the ‘game’ of international intrigue; it was unrestricted, first hand knowledge of the dirty aspect of the business on the ground, where the intrigues hatched by criminal minds at Langley, Virginia, are played out.  Suffice it to say, I departed Special Forces with a remarkable understanding of how underhanded the game of spies is played, the paramount importance of employing psychology to one’s advantage (in often devious ways), and the imperative necessity of the death of one’s conscience to be successful and survive. Having only learned about, not employed these nefarious skills, I took my conscience and ethics, intact, with me on departure, together with the remarkable tool kit I’d developed through this experience, in subsequent work as investigator. My favorite of these skills had been open source analysis, in fact in light of the avalanche of criticisms since the Snowden revelations, it has been pointed out CIA open source analysis has been more effective, by far, than any NSA program, in relation to spy-craft.

Now, applying old school spy-craft, to the point of this essay; how NOT to leak-

Since WikiLeaks had been locked out of its own leak platform we’ve had ‘OpenLeaks‘ (a flop) and since we’ve had the deceptive & falsely named, pandering to fools, so-called ‘SecureDrop‘ (remember Reality Winner?)

However ‘SecureDrop’ might have been well intended, I wouldn’t touch it with the proverbial ten-foot pole. What’s more is, I doubt you’d even need it, if you wished to leak. I’ll go into the why you wouldn’t need it first, and then why I wouldn’t touch it.

If you wished to have a secure platform to leak documented criminal activities from, as opposed to a supposedly ‘secure’ online platform to leak to, you should be able to build one yourself. And you shouldn’t need to be a computer guru to do it. The recipe is exceedingly simple:

Acquire a laptop that cannot be traced to you, from a yard sale in an unfamiliar neighborhood, example given. Park your car away from where you make the purchase. I don’t advise stealing a machine, but that’d work if you’re a competent thief and don’t leave a trail. We know the NSA has arranged to implant computers with bugged software, actual hardware in some cases, and we want a computer that it doesn’t matter if it ‘calls home’ (NSA) when certain red flags might be triggered by materials you might be handling, so onto the next paragraph.

Now, before you even fire the machine up for the first time, you kill the web-cam, a piece of paper taped over it will do just fine. And you disable the microphone and speaker with dummy jacks cut from discarded actual microphones and speakers and epoxy them in place, just to make certain they stay there. Carefully cut them off where the plug extends from the jack, so they are not obvious. Now your ‘leak platform’ is externally blind, deaf and dumb. Shut off bluetooth and search the machine for any GPS integrated software programs and disable them prior to logging on to the internet. DO NOT log into internet from your home.

Now, as to what you might be leaking, consider whether it will be tracked to you on the back-end (source.) Be assured in some environments there will be efforts to do certain things, like identify a computer that had items downloaded onto a memory stick. How will you get these materials safely into the machine you intend to leak from? Old fashioned spy-craft is something to consider, if you do not feel secure in the environment whose security you are breaching. Digital photos of actual documents can be loaded into the computer or paper documents can be scanned into your ‘leak platform’ (in which case you will want an older, untraceable scanner as well.) Use a digital camera that cannot be traced to you. You NEVER want to mail by post any documents, because certain addresses will be flagged by intelligence agencies and your package could be intercepted and might give up fingerprints and/or DNA and other information, such as a the postmark information needed to review security footage at specific locations on certain dates. Also, you’ll want clean paper documents for a scanner (particularly) or digital camera, on account of the possibility you might inadvertently scan your own or your colleagues fingerprints (use gloves when working with any paper documents.)

Ask yourself, is the material you are considering making public, of a demonstrable criminal nature? Or, does it shock the conscience in a sense of egregious violating principles of ethics? COVER YOUR ASS, BECAUSE NO MATTER THE PRECAUTIONS TAKEN, YOU MIGHT GET CAUGHT. Public opinion might save your butt, but don’t count on it, it hasn’t worked for many (if any in recent times.)

Remind yourself, there has been a dearth of leakers that have gone undetected. Has it ever crossed your mind why there has been no ‘deep throat‘ in our present era, and why it seems nearly everyone gets busted? As well, our Federalist Society majority on the USA’s ‘deep state’ owned (corporate board controlled) Supreme Court refused first amendment free press protection to journalism in the case of James Risen in a leaks case. They’ll be after you with everything at the system’s disposal and your chances are not good if you are detected at any level.

Now, you’ve decided, as a patriot, your leak is worth your liberty and/or life and you’ve convinced yourself you’ve stolen the material you wish  to leak without getting caught (let’s hope you’re right) and it’s time to deliver to the journalists, undetected. Perhaps you’d wish to wait three or six months, after you’ve gotten away with the initial theft, it’d be nice if the trail grows cold. Now, your documents are loaded into file that is easy to access, for instance located on the desktop. The email addresses you wish to send the information to are handy. Now, your platform, ‘Dr Leakey’ (named for the archaeologist), is ready. You are in familiar turf (if you are confident), or you have traveled to unfamiliar territory (if you have nerves of steel.) What you need is an open wireless signal you can log onto. When you’ve found this at a cafe or a truckstop or simply a careless person in any neighborhood with unlocked wireless where you can log in from, sitting in your car parked close by (beware of cctv), log on. Create a faked email account (that you will never use again.) Send a first mail (BCC to recipients) to yourself, explaining there is a second mail following with attachments and stating if the recipient does not see the second mail, to look in their spam folder. This mail should pop up and you see it with no failed addresses (from the BCC to the people you are mailing.) Seeing you have a working address on both ends (i.e. functioning mail accounts) and are you still determined to do this, ask yourself, for real? Deep breath, new mail addressed, attached file(s), hit send, have coffee, read the paper, look at ease, normal, belonging in your environment while the what might seem like ages in time pass as the file uploads from the computer and finally the mail goes ‘whoosh’ (in your mind) and the leak is done.

Calmly go on about your day and know how you will be disposing of Dr Leakey. You used him for this one project and will never use him again. Example given, pull out the ram, hard drive goes to the incinerator (an all night campfire will do), break the screen as though Dr Leakey had been accidentally dropped & parts salvaged, and the carcass destination ends in a dumpster (leave no fingerprints.) Same fate for either the digital camera or scanner, if you used these. Be patient for results in the news. You’ve just dropped a bomb from the unseen world and any journalist worth your while, will take time to try and authenticate the information you’ve provided. If they blow it off and never pursue the lead, maybe the gods actually love you. If you’ve gotten away with it, resist temptation to ever do it again. There might be such thing as a charmed life, but it’s probably not yours.

By now, the NSA with its billions of mails to look through, will come up with (at most) someone sent a mail from an account used ONCE, from an computer they never see log in again, over some unsecured random wireless signal in the greater Los Angeles metropolitan area, example given. Maybe you live in this area of 13 million people or maybe you don’t. This is because you left little in the way of digital fingerprints by finding a way around taking your leak out on a memory stick. Enjoy a quiet laugh and hope you were good enough getting the material out the back-end, with a cold or faint trail, because if you did it right,  they can’t track you from that end. And then erase your personal memory, the one between your ears, because you never wish to tell ANYONE, who you are, in relation to what you’ve done. Meanwhile, study technique along the lines set out by a former FBI agent in the article ‘Spy Craft for Hacks‘ but even there the deck is stacked against you with an ‘agency friendly’, very serious lie by omission; don’t ever have your cell phone (or any mobile device) along on what would then become a misadventure. You’ll need cold nerves, excellent understanding of the environment and good luck, to pull it off. Nothing suffices for this like training and even then, there is no absolute way of doing these things undetected. Luck and competence on your own part and that of your adversaries play into this as well.

Now, to why you probably don’t actually want or need to leak. Firstly, we know it is no longer a conspiracy ‘theory’ (rather conspiracy fact) the USA’s security state is behaving like nazis in relation to surveillance of its own people. We know it’s likely the corporate ‘deep state’ co-opted congress, president and courts are doing little and will do little or nothing to actually change this behavior of the MILITARY elements in control of the runaway NSA, other than at most, wring their hands for public consumption. You don’t need much more knowledge to effect change, if change is going to happen. And if change isn’t happening, what’s the point? If our society’s leading lights are merely content (at most) to shout and stamp their feet like spoiled children at what is going on, rather than shut down ‘business as usual’ along the lines of refusing this criminal hydra legitimacy and attending power, and you don’t see the tectonic plate shift in public outrage necessary to force the issue, there really is no point, people have been cowed into obedience along the lines predicted by both Orwell & Huxley. On the one hand you have Orwell’s conservative sheep bleating on behalf of the ‘security’ state over the terror propaganda all of our western world has been fed. On the other hand you have Huxley’s ‘it’s all about me’ MTV generation could care less about civil liberties beyond freedom to consume, extreme sport, sex, fashion and media ego. With corporate media feeding a public with an education one mile wide and one quarter inch deep (1.6 kilometers wide & 1/2 centimeter deep), the Billy Grahams and Hollywood (our two primary oracles of ‘god’) rule a society which has cannot be saved from itself, because you cannot get the majority’s attention long enough to explain a few sensible things that might change their focus, if not their beliefs, whether puritan or hedonistic. This reflects social engineering via media information operations.

Stepping into/out of this world in relation to spies and leaking is a very dangerous proposition for the untrained. Now is time to work with what we know, not obsess with pursing endless soap operas concerning information on criminals you exercise no real control over. And there is a reason intelligence will want you obsessing (keep reading.)

What can be clearly inferred from open source analysis is, our civil structures have become criminal, out of control, one could go so far as to simply state ‘insane.’ And this is what is distracted from, when obsessed with being outraged at the western democracies ‘voyeurism’ in relation to ‘the people’ who supposedly are in control of our future direction via the principle of ‘consent of the governed.’ The propagandists at the several corporate board controlled intelligence agencies, via co-opted western media, will work to guide and exploit this national tantrum to a (hopefully) calmed down child at the end of the day.

As to the ongoing criminal agendas, one only need look at Chevron (example given) as a corporate gangster poster child and how they’ve managed to buy congress and the courts via Federalist Society owned justices at the top, along the lines of ‘citizens united.’ As for the out of control, one only need look at how ineffective congressional oversight has been, and is presently, in regards to NSA, example given, and there is no change in sight. As for the insane, one only need look at the USA, and it’s lapdog western democracies, pushing Russia to the brink with geo-political capers recently best illustrated in Ukraine, and how western media lies to the public about what is actually going on. Left unchecked, this insanity will certainly lead to VERY BAD subsequent events.

Now, to alternative media and the so-called ‘progressive’ movement, here’s why I wouldn’t touch any online platform, despite examples such as the ‘indomitable’ Guardian subscribe to ‘SecureDrop.’

To begin with, directing leaks to electronics communications platforms is playing to the NSA’s strong point, this area of expertise is SIGINT (signals intelligence), the NSA forte. No matter the encryption expertise involved in any platform’s construction, it is an invitation to play in the lion’s den. Be assured, the NSA (not to mention GCHQ and other intelligence agencies) will assign crack teams to SecureDrop (if ‘securedrop’ were not actually designed by these.)

The Guardian (newspaper) is an organization that would be very deliberately targeted by HUMINT (human intelligence) as a matter of fact. Organizations wishing to penetrate, spy, shape dialogue & policy within the Guardian would include MOSSAD, CIA, DGSE (France) and the British intelligence agencies. Each of these agencies will have a vested interest in covert penetration of the Guardian on account of that paper not having been (yet) entirely monopolized by any one of the Western intelligence agencies (which squabble & compete among themselves.) Anything, were it sent through the pretense of a so-called secure system, is at risk of exposure to clandestine a rabbit warren designed by spies within the Guardian organization. Trust me, they’re there. MOSSAD particularly, would be interested in any information it could potentially acquire, as ‘chits’ to trade to the USA (and other nations) for political favors, as its political currency continues in steady decline over West Bank issues. Just because you possibly managed a ‘secure’ leak (in your dreams) over the SecureDrop system, does not mean you are secure, not by a long shot, because you cannot know how the material might be compromised after it has been put through, let alone whether the system itself is penetrated/designed to identify the source point of the upload and MOSSAD trades YOU in a quid pro quo with another agency.

And now to the odious (closing) aspect of this essay.

“You can imagine my surprise when I read the June 13, 1971, issue of the Sunday New York Times and saw there among the “Pentagon Papers” a number of basic information papers that had been in my own files in the Joint Chiefs of Staff area of the Pentagon. Most of the papers of that period had been source documents from which I had prepared dozens — even hundreds — of briefings, for all kinds of projects, to be given to top Pentagon officers. Not only had many of those papers been in my files, but I had either written many of them myself or had written certain of the source documents used by the men who did.

“Many people have been so concerned about what has been happening to our Government that they have dedicated themselves to investigating and exposing its evils. Unfortunately, a number of these writers have been dupes of those cleverer than they or with sinister reasons for concealing knowledge. They have written what they thought was the truth, only to find out (if they ever did find out) that they had been fed a lot of contrived cover stories and just plain hogwash

“In the hands of Allen Dulles, “secrecy” was simply a chameleon device to be used as he saw fit and to be applied to lesser men according to his schemes. It is quite fantastic to find people like Daniel Ellsberg being charged with leaking official secrets simply because the label on the piece of paper said “TOP SECRET,” when the substance of many of the words written on those same papers was patently untrue and no more than a cover story. Except for the fact that they were official “lies”, these papers had no basis in fact, and therefore no basis to be graded TOP SECRET or any other degree of classification

“Any reader of the “Pentagon Papers” should be warned that although they were commissioned on June 17, 1967, by the Secretary of Defense as “the history of United States involvement in Vietnam from World War II [Sept 2, 1945] to the present” [1968], they are unreliable, inaccurate and marred by serious omissions. They are a contrived history, at best, even though they were written by a selected Task Force under Pentagon leadership” -Pentagon liaison to the CIA, L. Fletcher Prouty

In fact the so-called ‘Pentagon Papers’ were intended to deflect attention from the CIA and onto the military, concerning policy failures in Vietnam.

Open source analysis profiles (STRONGLY) Daniel Ellsberg as an intelligence agency officer, almost certainly CIA. What the CIA edits at wikipedia doesn’t inform of, when the public is fed

“Ellsberg served in the Pentagon from August 1964 under Secretary of Defense Robert McNamara (and, in fact, was on duty on the evening of the Gulf of Tonkin incident, reporting the incident to McNamara). He then served for two years in Vietnam working for General Edward Lansdale as a civilian in the State Department”

…is Ellsberg’s work for Edward Lansdale at Department of State has CIA information operations written all over it. One of CIA’s big tasks is information operations or social engineering via psychological manipulation of entire populations. And Ellsberg was working with one of the CIA’s true big shots in this area of intelligence expertise. The ultimate purpose of the ‘Pentagon Papers’ leak was information operations (social engineering) to shield the CIA from public accountability for the massive intelligence & related policy failures in Vietnam; by shifting public focus onto the Pentagon. The CIA was expendable and could have been disbanded. The Pentagon could not be done away with.

“That I had written parts of some of them proves that they were not genuine Pentagon papers, because my work at that time was devoted to support of the CIA” -L Fletcher Prouty

Colonel Prouty blew the whistle on the CIA & Ellsberg over 40 years ago. Colonel Prouty’s work, which has borne the test of time, is buried, meanwhile, whistle-blower ‘legend’ Ellsberg invites leakers into the SecureDrop cobra’s lair… as you actually believe the initial SecureDrop developer, Aaron Schwartz, hanged himself (and his co-developer’ ‘died’ after that.) Probably, it’s a case of, examples given, Gary Webb shot himself in the head TWICE (Superman could do that.) It’s an old model, for instance when Eli Black had stepped into longtime CIA turf at United Fruit, he was framed with an SEC investigation and a subsequently ‘depressed’ Eli broke an industrial strength skyscraper window with his briefcase and ‘jumped’ 44 floors from his office building. No-no, the CIA liaised generals at NSA won’t be allowing certain activities to move forward unimpeded. The only question with ‘SecureDrop’ is, how it has been compromised (since inception or when the source code was stolen, likely about the time Schwartz ‘hanged’ himself.)

Daniel Ellsberg has been a champion of WikiLeaks which has employed SecureDrop via tor (tor is a USA military intelligence tool.)

Ellsberg has promoted SecureDrop for Exposefacts.org.

Has it ever occurred to anyone, as to why, no one has ever outed a ‘Kim Philby‘ type character embedded in the progressive and peace movements, as though intelligence operatives would never caper within that playground? I’ll name you one. Daniel Ellsberg.

“From the beginning, the Pentagon Papers were a compilation of documents designed to paint President John F. Kennedy as the villain of the story, and to shield the role of the CIA” L Fletcher Prouty

Meanwhile, so-called ‘SecureDrop’ has been leaking the leakers identities for years.

 

This is a majorly rewritten, updated & re-titled piece from 2014 –

 

related at this site:

Pentagon Papers, CIA and the Lies of Daniel Ellsberg

The Smelly Side of Wikileaks

The NSA’s Egregious Liar: Why This Definition Should Matter

further reading:

[1] https://hiddenhistorycenter.org/colonel-l-fletcher-prouty-on-the-pentagon-papers/

[2] https://www.archives.gov/research/pentagon-papers

[3] https://ratical.org/ratville/JFK/ST/

[4] https://unredacted.com/2014/01/17/the-top-10-surveillance-lies-edward-snowdens-leaks-shed-heat-and-light-on/

 

*

 

A former Sergeant of Operations and Intelligence for Special Forces, Ronald Thomas West is a retired investigator (living in exile) whose work focus had been anti-corruption. Ronald had lived over thirty years in close association with Blackfeet Indians (those who still speak their language), and is published in international law as a layman: The Right of Self- Determination of Peoples and It’s Application to Indigenous People in The USA or The Mueller-Wilson Report, co-authored with Dr Mark D Cole. Ronald has been adjunct professor of American Constitutional Law at Johannes Gutenberg University, Mainz, Germany (for English credit, summer semester 2008.) Ronald’s formal educational background (no degree) is social psychology. His therapeutic device is satire.

Contact: penucquemspeaks@googlemail.com

“Non-cooperation with evil is as much a duty as cooperation with the good” -Mahatma Ghandi

A Sociopaths & Democracy Project

All original work and art © copyright by Ronald Thomas West; for profit and mass paper media redistribution prohibited

 

 

0 Comments Post your own or leave a trackback: Trackback URL

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: