tarmac video was discussed on the March 9th Q thread
http://www.freerepublic.com/focus/chat/3638382/posts?page=532#532
and April 2nd Q thread as well a few other place
http://www.freerepublic.com/focus/chat/3644414/posts?page=690#690
According to judicial watch there was a FOIA request for the recordings of the tarmac meeting which was denied.
Kawas Freedom of Information Act (FOIA) request to the NSA was denied, citing national security, but the NSA did not deny that the tape exists.
To respond to your request, NSA would have to confirm or deny the existence of intelligence records on Loretta Lynch, the agency stated in its FOIA response on November 14, days after the election. Were we to do so in your case, we would have to do so for every other requester. This would enable, for example, a terrorist or other adversary to file a FOIA request with us in order to determine whether he or she was under surveillance or had evaded it. This is turn would allow that individual to better assess whether they could successfully act to damage the national security of the United States. For such reasons, we can neither confirm nor deny the existence or non-existence of the records you requested.
https://americansecuritytoday.com/recording-clinton-lynch-tarmac-meeting/
Kawa stated that the Defense Informations Systems Agency manages the monitoring of telephonic devices and electronic communication systems a board the airplane of certain government officials including the Attorney General, who is required to use a government issued plane for all travel both personal and business.
Kawa has filed a FOIA request with several government agencies including the FBI, which can be found here.
The FOIA law allows for expedited processing in under 10 days in unusual circumstances consistent with those described above regarding the need for immediate public disclosure of government related business.
Kawa states, In conclusion, it was statutorily required for Loretta Lynch to be on a government plane, which she was on June 27, 2016 when she met with President Bill Clinton on the tarmac in Phoenix.
The Tempest Emanations program through the NSA and NATO monitored the telephonic and computer devices on that plane through the VOSIP component of CommSec (Communications Security).
Data captured would have included audio and video through the plans telephonic, computer, and other electronic devices. Such information would be captured and stored by the NSA and it should be publicly available through FOIA.
https://www.wired.com/2008/04/nsa-releases-se/
Far across the lab, a freestanding oscilloscope had developed a habit of spiking every time the teletype encrypted a letter. Upon closer inspection, the spikes could actually be translated into the plain message the machine was processing. Though he likely didnt know it at the time, the engineer had just discovered that all information processing machines send their secrets into the electromagnetic ether.
Call it a TEMPEST in a teletype.
This story of how the United States first learned about the fundamental security vulnerability called compromising emanations is revealed for the first time in a newly-declassified 1972 paper TEMPEST: A Signal Problem (.pdf), from the National Security Agencys secret in-house journal Cryptologic Spectrum.
There has always been speculation about TEMPEST coming out of the Cold War period, says Joel McNamara, author of Secrets of Computer Espionage: Tactics and Countermeasures, who maintained for years the best compilation of public information on TEMPEST. But the 1943 Bell Labs discovery is roughly ten years earlier than I would have expected.
The unnamed Bell Telephone technician was the Alexander Graham Bell of a new, secret science, in which electronic eavesdroppers as far away as hundreds of feet from their target tune into radio waves leaking from electronic equipment to steal secrets.
Building on the breakthrough, the U.S. developed and refined the science in an attempt to spy on the Soviets during the Cold War. And it issued strict standards for shielding sensitive buildings and equipment. Those rules are now known to government agencies and defense contractors as TEMPEST, and they apply to everything from computer monitors to encrypted cell phones that handle classified information.
690 posted on 4/3/2018, 9:38:14 AM by edzo4 (Thank Q very much!!!)
bookmark
I need to save this