An authentic CIA report - in full - goes something along these lines:
Over the last period of ____ to ____, we analysed data from all sources and commenced surveillance or closer observation of (for example) '350' potential targets.
Of those, (for example) '75,' were regarded as having cause to scrutinize using a higher level of human resources.
During the said period, we ran '35' group surveillance projects,
...'11' additional surveillance projects targeting sole individuals,
of whom, '7' were within government organizations, and
...'3' were employed in sensitive or mission critical private firms or contractors.
'25' FSA warrants were sought during the period and '25' were subsequently obtained.
Three arrests have been made and several possible interdicts of possible dangerous illegal activities occurred.
The Agency uncovered '5' possible clandestine 'hand-off' events, and closed down '150' possible or potential 'dead drop' sites across the country.
On the basis of a combination of intercepted communications from the targets under surveillance, and digital data gathered from examining various computers and servers, we have determined that, there is a correlation between the organised activities of covert cells acting withing the United States, and the illegal accessing of private or confidential government communications and data archives as and when or within an umbra time frame of movements of finance or possible encrypted 'orders' moving through the covert cell traffic and its communication channels.
The correlation gives us a 'high confidence' that... et cetera.
In summary:
- 350 potential targets
- 75 targets
- 35 group targets
- 11 sole targets
- 3 arrests
- 5 'live' current cells revealed and left intact for further/ on-going action
And then there is often attached, a summarized contrary opinion or minority report.
Finally there might be some word on 'Assembly code' software - or 'Assembler/Assembler' software that was used to uncover indications that computers had been 'peered into' and what those signatures really were in terms of dates of such signatures (old signatures meant off-the-shelf software and were extremely unlikely to be used by serious professional hackers).
Now assume of course the numbers are nowhere near anything that might be an accurate reflection of the levels of actual government counter-espionage activity, and assume that in any de-classified report, the numbers would be modified or blacked-out entirely with only privileged members of the House selected to see them, nevertheless, this will give you an impression of what a true report would look like.
The CIA report was a combination of bizarre, ludicrous, childish, foolish, amateurish, insulting, and in the end, dangerous and reckless.
It was tendentious in the extreme.
No comments:
Post a Comment
Your considered comments are welcome