Donate $25 for two DVDs of the Cryptome collection of files from June 1996 to the present

Natsios Young Architects


18 December 2009. Could be legitimate information but the list of recipients suggests a sting.


Date: Thu, 17 Dec 2009 16:57:28 -1000
Subject: Cryptome: Latency in Wiretap Order Fulfillment
From: "Lee @ Royal Gardens" <lee@royalgardens.us>
To: cryptome <cryptome@earthlink.net>, tscm-l2006 <TSCM-L2006@googlegroups.com>, 
	"Painter, Christopher M." <Christopher_M._Painter@nsc.eop.gov>, christopher.painter@ic.fbi.gov, 
	christopher.painter@usdoj.gov, info <info@in-q-tel.org>

[FOR PUBLIC AS ANON, retain forward-able email for inquiries.]

Cryptome:

There appears to be a prioritization and fulfillment latency in the
access to wiretap authorities by minor jurisdiction (organized crime
courts) compared to the various federal and related.

Of note, there was close to a 3 day latency between activating a new
Verizon account (mifi wireless device) before the organized crime
entities misusing small police jurisdictions were able to re-route and
intercept/jam communications on the wire.

Contrarily, the DHS Fincen/USSS taps were activated immediately,
likely before the account was assigned, as the credit check required
provided an account trace which also GENERATED A CUSTOM NUMBER
assigned to the account reinforcing their tampering/molestation
activity.

Also, there appears to be a very strong intercept prioritization
problem, namely when multiple full wire intercepts may be registered
(this human would automatically fall in early counter-terrorism watch,
FBI-Esp and DIA, USSS Treas, etc automatic) but also highly targeted
by organized crime fronts and various corporate parties including
misled banks exploiting very small jurisdictions to gain court orders,
as well as foreign-asset and foreign-interest flags registered to UN,
NATO, and federal which activate automatically.

These interjections, especially between endpoint and large information
sources (including the google products and WhiteHouse.GOV's captchas),
appear to be highly COMPETITIVE, meaning there are very fast context
derived throttles between flag authorities which all appear to be
MANAGED through the same master interface but are very much related to
the targeted and explicit injecting/providing or denial of certain
types of information. There will be jammed denial responses from a
google search with obvious false injected content but then immediately
later (same page) there will be jammed highly accurate data with very
overt flags to which parties supposedly preferred the content getting
through rather than prevented entirely. This replacement of content
happens both in wire intercept as well as from the content management
subsystems in the search provider. Simultaneous requests from a new
and unknown device gain common legitimate responses. There is
indication the wire is fully compromised at various main points but
there is also MAC and account/transaction-tracked triggers that
perform in locations of the communication's propagation that are more
likely in the controlled mainstream information sources.

When complaints are filed with I3c, Tips.FBI.Gov, DHS/USSS,
INFO@IN-Q-TEL.ORG, etc., each independently triggers specific topics
and content targets to be molested DIFFERENTLY than when their timers
pass a few minutes/hours later (FBI has a 2 hour immediate override
and then approx 3 days of monitor, usss/dhs trigger for a few minutes
to trace and identify the endpoint electronic device) which then open
up the opportunity for LOWER RANKED EXPLOITS to compete for the single
wire, inducing explicit throttle between contexts as each
jamming/interjection system gains authority for a time period.

Obviously, there is also indication of remote tracing and polling of
wire activity by unconventional weapons, typically related to Secret
Service or Military observation but technologies accessible to anyone,
and occasionally indications such as electrical or electrostatic
spikes resulting from multiple probes against the target electronics
simultaneously or more visibly the polling tracer which locks on to
the field of the CRT monitor and very actively traces VISUAL
ILLUMINATION when topics such as the word-confirm "reCaptcha" (google,
wikipedia, *.gov) are monitored off the screen by electric field.
(this is apparently a visual-likeness requirement rather than simply
listening the VGA signals?) On frequent occasions these signal
observation methods have been identified to be disrupting eachother
regarding specific targets during activation or loss of wire intercept
by the competing parties. FCC Part 15 as always.

These topics are quite interesting, horribly troubling and problematic
as all communications are jammed, but provide useful insight into the
mechanisms used by various levels of intercept, jamming,
disinfo/propaganda, and general wiretap processes on paper and in
real-world implementation.

[FOR PUBLIC AS ANON, retain forward-able email for inquiries.]