Jun 8, 2013 - By ABBY D. PHILLIP
 
http://www.newsmax.com/Newsmax/files/f5/f5a482f2-6df3-499e-a6c3-cd04f8b34b7a.jpg

ABC News spoke to Marc Ambinder, co-author of "Deep State: Inside the Government's Secrecy Industry," about how the leaker could have done it and what may happen next.

Following is an edited transcript of the interview.

ABC News:  How could someone manage to leak this kind of sensitive information?

Marc Ambinder: The first thing that caught my eye about the Powerpont document was "ORCON." It's a phrase that is put on classified documents to refer to the control mechanisms where the originator of the document is the controller -- meaning it's sensitive enough that I'm the only person who gets to decide who sees it.

Documents with that particular marking on it are always viewed in areas that are cleared for top-secret data. And you can't view the document, print the document or take a screen grab of the document without leaving an audit trail. Every document that they look at is recorded internally.

Someone could print out a document like that and walk out with it and even make a copy of it. But even making a color copy of it leaves a record or a trial.

ABC News:  What kind of person would do this?

Ambinder: If the person who did this risked leaving a trail or clues that the government can find they are obviously very disturbed with the foundation on which the modern surveillance state rests and wanted to do something dramatic about it.

It's much easier to leak information that is classified as secret, but the government is obsessive about top-secret information.

No document like this has ever been leaked from the NSA. The NSA has its own counter-intelligence team known as the Q force whose job it is to work on preventing leaks like this.

I think there's one person or entity that's doing this [leaking both information about PRISM and the government's collection of phone data records].

If I were in the government trying to do this, I would try to recruit likeminded friends and try to circumvent the risk of the secrecy apparatus. It would be very difficult and dangerous. He or she took enormous risks to do this.

ABC News:  But what about Bradley Manning? He was able to leak sensitive information in Wikileaks by slipping it out, essentially, on a thumb drive.

Ambinder:  That was in a war zone and, at the time, flash drive and CD use were quasi-permitted. And the information was on a computer that was classified at the secret level.

Information at the top-secret level is on a completely different level. Top secret systems are completely different. They are internally monitored and watched much more carefully.

ABC News: What happens now? How will the government respond?

Ambinder: I don't blame the government for launching a leak investigation. From the government's perspective, documents involving top-secret information usually involve sources and methods whose revelation would significantly impact national security. Those are the types of things that are classified at this level.

The documents are time-stamped, so the government can figure out instantly the universe of 4,000 people who can see them at a particular time. They'll do what they do. They may polygraph 4,000 people, which is not unusual for them to do in leak investigations like that.

We will know the identity of the leaker before too long. The leaker, when caught, would be treated prosecutorially a lot harsher if they are caught -- even from Bradley Manning -- because the document was classified at a higher level.

Views: 1106

Reply to This

Replies to This Discussion

I think I know the spoiler -- Cisco microprocessors are the backdoor to every system.

Chinese Backdoor Found In Widely-Used US Military Microprocessor

On the evening of one of United States’s most widely celebrated holidays – Memorial Day, comes some disheartening yet not-so surprising news.
Cambridge University researchers have recently discovered that a microprocessor that is widely used by the US Military, contains a “backdoor” that would allow reprogramming or shutdown of the processor.  The microprocessor is manufactured in China.

The use of this backdoor could allow for IP theft, fraud or reverse-engineering of the devices and firmware that utilize it.  It’s reported that one of the main uses of this microprocessor is in missile defense and and missile guidance systems, though that hasn’t yet been confirmed.

http://www.infosecwreck.com/chinese-backdoor-found-in-widely-used-u...

Chip

"I don't blame the government for launching a leak investigation"

lol..Sorta like getting the weasels to guard the hen house right?.... 

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Sandy posted a video

Ghislaine Maxwell & The Secret "Shadow" 9/11 Commission? | John Kiriakou

In this gripping excerpt from the Julien Dorey podcast, former CIA officer and whistleblower John Kiriakou reacts to a leaked email from 2003. The document r...
6 hours ago
cheeki kea left a comment for Holyroller
"Greetings to you Holyroller very awesome you've joined up with us all. I know you'll find…"
11 hours ago
cheeki kea commented on Doc Vega's blog post Are the End Times Drawing Near?
"Yes it's a sad and sorry situation we see evolving here. On one front and it's a large…"
12 hours ago
Doc Vega commented on tjdavis's video
Thumbnail

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

"I remember this when I was a little seeing it on TV years after it was filmed and it scared me even…"
16 hours ago
tjdavis posted a video

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

Starring Jack Webb and Robert Conrad, this 1957 movie by the United States Armed Forces Information Agency is perhaps the best known anti-communist movie eve...
20 hours ago
Doc Vega posted a blog post

Are the End Times Drawing Near?

Are we seeing the gradual fulfillment of the Battle of Armageddon? Think of it. The US and Israel…See More
yesterday
Holyroller is now a member of 12160 Social Network
yesterday
tjdavis posted a blog post
yesterday
Sandy posted photos
Sunday
Burbia posted a video

Catherine Fitts: Epstein, CIA Black Budget, the Control Grid, and the Banks’ Role in War

Programmable digital currency is the final piece of the global control grid that’s finally snapping into place. Catherine Austin Fitts on how to defeat it. C...
Saturday
Евеліна posted a status
"цікаво, воно цитатами виділяє, як моє особливе "я""
Friday
Евеліна posted a status
"на роботі, сонце світить, потрібно перепочити."
Friday
Евеліна posted a blog post

Ключові слова в тексті: як органічно їх вписати в статтю

Що таке ключові слова і чому вони важливіКлючові слова — це слова або фрази, які користувачі…See More
Friday
Евеліна is now a member of 12160 Social Network
Friday
Burbia left a comment for pohonemas33 team
"Quit promoting gambling on another site"
Friday
tjdavis posted a photo
Friday
pohonemas33 team commented on DTOM's photo
Thumbnail

Orwell - Football, Beer & Gambling

"kalau kamu cari tentang trik dan tips main slot online biar gampang menang, coba cek di situs…"
Feb 25
pohonemas33 team commented on tjdavis's photo
Thumbnail

DejaVu

"coba iin main game slot online di situs POHONEMAS33"
Feb 25
tjdavis posted a video

I, Pet Goat VI by - Seymour Studios | I, Pet Goat 6

I, Pet Goat VI by - Seymour Studios | I, Pet Goat 6It's time for great JihadI presented the events in the Middle East as an animated short film based on the ...
Feb 23
tjdavis posted a photo
Feb 22

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted