Members banned from this thread: AProudLefty |
Even if this were true- AND I'M NOT SURE IT IS....
BUT I AM SURE that announcing our Military or Intelligence Operations to the world is a great idea.
The bootlickers will call Signature Reduction a conspiracy theory and claim it never happened. As we know from the CIA, you're more likely to be recruited by Signature if your are woke.
The newest and fastest growing group is the clandestine army that never leaves their keyboards.
These are the cutting-edge cyber fighters and intelligence collectors who assume false personas online, employing "nonattribution" and "misattribution" techniques to hide the who and the where of their online presence while they search for high-value targets and collect what is called "publicly accessible information"—or even engage in campaigns to influence and manipulate social media.
Hundreds work in and for the NSA, but every military intelligence and special operations unit has developed some kind of "web" operations cell that both collects intelligence and tends to the operational security of its very activities.
In the electronic era, a major task of signature reduction is keeping all of the organizations and people involved in the clandestine operations masked. This protective effort entails everything from scrubbing the Internet of telltale signs of true identities to planting false information. As standard unforgettable identification and biometrics have become worldwide norms, the signature reduction industry also works to figure out ways of spoofing and defeating everything from fingerprinting and facial recognition at border crossings, to ensuring that undercover operatives can enter and operate in the United States, manipulating official records to ensure that false identities match up.
Just as biometrics and "Real ID" are the enemies of clandestine work, so too is the "digital exhaust" of online life.
https://www.newsweek.com/exclusive-inside-militarys-secret-undercover-army-1591881
Every morning at 10:00 a.m., Darby embarks on his rounds.
Darby is not his real name, but it is also not the fake name on his Missouri driver's license that he uses to conduct his work.
And the government car he drives, one of a fleet of over 200,000 federal vehicles owned by the General Services Administration, is also not registered in his real or his fake name, and nor are his magnetically attached Maryland state license plates really for his car, nor are they traceable back to him or his organization. Where Darby works and the locations he visits are also classified.
Darby asks that neither his real nor his cover name be used. He works for a Maryland-based signature reduction contractor that he asked Newsweek not to identify.
As Darby makes his rounds to some 40 or so post offices and storefront mailbox stores in the DC Metropolitan area, he picks up a trunk full of letters and packages, mailing a similar number from rural addresses.
Back at the office, he sorts through the take, delivering bills to the finance people and processing dozens of personal and business letters mailed from scores of overseas locations. But his main task is logging and forwarding the signature reduction "mechanisms" as they are called, passports and State driver's licenses for people who don't exist, and other papers—bills, tax documents, organization membership cards—that form the foundation of fake identities.
To register and double-check the authenticity of his daily take, Darby logs into two databases, one the Travel and Identity Document database, the intelligence community's repository of examples of 300,000 genuine, counterfeit and altered foreign passports and visas; and the other the Cover Acquisition Management System, a super-secret register of false identities where the "mechanisms" used by clandestine operators are logged.
For false identities traveling overseas, Darby and his colleagues also have to alter databases of U.S. immigration and customs to ensure that those performing illicit activities can return to the United States unmolested.
For identity verification, Darby's unit works with secret offices at Homeland Security and the State Department as well as almost all 50 states in enrolling authentic "mechanisms" under false names.
A rare picture into this world came in April 2013 when an enterprising reporter at Northwest Public Broadcasting did a story suggesting the scale of this secret program. His report revealed that the state of Washington alone had provided hundreds of valid state driver licenses in fictitious names to the federal government. The existence of the "confidential driver license program," as it was called, was unknown even to the DEMOCRAT governor.
Before the Internet, Darby says—before a local cop or a border guard was connected to central databases in real time—all an operative needed to be "undercover" was an ID with a genuine photo.
These days, however, especially for those operating under deep cover, the so-called "legend" behind an identity has to match more than just a made-up name.
Darby calls it "due diligence": the creation of this trail of fake existence. Fake birthplaces and home addresses have to be carefully researched, fake email lives and social media accounts have to be created. And those existences need to have corresponding "friends."
Almost every individual unit that operates clandestinely—special operations, intelligence collections, or cyber—has a signature reduction section, mostly operated by small contractors, conducting due diligence. They adhere to the six principles of signature reduction: credibility, compatibility, realism, supportability, verity and compliance.
Compliance is a big one, Darby says, especially because of the world that 9/11 created, where checkpoints are common and nefarious activity is more closely scrutinized.
To keep someone covert, and to do so for any period of time, requires a time-consuming dance that not only has to tend to someone's operational identity but also maintain their real life back home.
This includes clandestine bill paying but also working with banks and credit card security departments to look the other way as they search for identity fraud or money laundering. And then, signature reduction technicians need to ensure that real credit scores are maintained—and even real taxes and Social Security payments are kept up to date—so that people can go back to their dormant lives when their signature reduction assignments are placed on hiatus.
Darby's unit, originally called the Operational Planning and Travel Intelligence Center, is responsible for overseeing much of this (and to do so it operates the Pentagon's largest military finance office), but documentation—as important as it is—is only one piece of the puzzle. Other organizations are responsible for designing and manufacturing the custom disguises and "biometric defeat" elements.
This is where all the Special Access Programs are. SAPs, the most secret category of government information, protect the methods used—and the clandestine capabilities that exist—to manipulate systems to get around seemingly foolproof safeguards including fingerprinting and facial recognition.
There are an increasing number of government investigators—military, FBI, homeland security and even state officials—who are not undercover per se but who avail themselves of signature reduction status like fake IDs and fake license plates because they work domestically.
https://www.newsweek.com/exclusive-inside-militarys-secret-undercover-army-1591881
Bookmarks