"The leaked email communication from an executive of #Stratfor says that, as Deputy National Security Advisor in 2010 to #Obama, #Brennan and the White House were determined to:

'go after anyone printing materials negative to the Obama agenda.'"
#NoCPTPP

"#Stratfor has been dubbed the 'Shadow #CIA.'”

https://t.co/TKh2CR1vFW
"In an email written by #Stratfor President #FredBurton to work colleagues, Burton wrote on November 21, 2010:

'#Brennan is behind the #witchhunts of investigative journalists learning information from inside the beltway sources...'"

https://t.co/TKh2CR1vFW
"[#JohnBrennan] Was to Be Subject of Exposé by Rolling Stone Reporter #MichaelHastings Before Hastings Mysteriously Killed in Crash"

https://t.co/TKh2CR1vFW
"Speculation became rampant that the #CIA had something to do with [#MichaelHastings’] death."

https://t.co/TKh2CR1vFW
"Brennan was well-known as being one of the prime movers and shapers of what has become known as the Executive Branch 'Disposition Matrix,' a list of alleged terrorists targets instituted by the Obama administration who are slated for summary execution..."
https://t.co/TKh2CR1vFW
"The final selection of #targets has become a weekly ritual at the White House which became known as 'Terror Tuesdays.'”

https://t.co/TKh2CR1vFW
"#Brennan runs a policy so #secret that it is impossible for outsiders to judge whether it complies with the laws of war or U.S. values — or even determine the total number of people killed.”

https://t.co/TKh2CR1vFW
"#MichaelHastings’ death was investigated in-depth by San Diego 6 reporter Kim Dvorak, who labeled the death 'suspicious.'”

https://t.co/TKh2CR1vFW
#JohnBrennan

#TPPIsABackDoorDeal4China

#NoTPP #StopCPTPP

"'It was all a massive conflict of interest, and it was all a bit weird,' a former employee said. 'I believe the Chinese thought we were working for the #CIA.'"

https://t.co/95vqN6v0Ln
"[#JohnBrennan]: 'We put together a #FusionCenter at #CIA that brought #NSA and #FBI officers together with #CIA to make sure that those proverbial dots would be connected.”

https://t.co/HDECsBbBpR
5 out of 16 DEAD.
2+, almost killed
1 impeached
2 threatened w/extradition
1 in exile
1 media outlet branded "Russian agent"
1 capitulated to DNC, now parrots phony Russiagate speech, despite being a victim of it.
3+ smeared & careers harmed.

https://t.co/yp61lGqPWN
https://t.co/QyfyKt9hNo
https://t.co/EcbOSAVl6d
https://t.co/itZtyoRAnF

More from Crime

My students @maxzks and Tushar Jois spent most of the summer going through every piece of public documentation, forensics report, and legal document we could find to figure out how police were “breaking phone encryption”. 1/


This was prompted by a claim from someone knowledgeable, who claimed that forensics companies no longer had the ability to break the Apple Secure Enclave Processor, which would make it very hard to crack the password of a locked, recent iPhone. 2/

We wrote an enormous report about what we found, which we’ll release after the holidays. The TL;DR is kind of depressing:

Authorities don’t need to break phone encryption in most cases, because modern phone encryption sort of sucks. 3/

I’ll focus on Apple here but Android is very similar. The top-level is that, to break encryption on an Apple phone you need to get the encryption keys. Since these are derived from the user’s passcode, you either need to guess that — or you need the user to have entered it. 4/

Guessing the password is hard on recent iPhones because there’s (at most) a 10-guess limit enforced by the Secure Enclave Processor (SEP). There’s good evidence that at one point in 2018 a company called GrayKey had a SEP exploit that did this for the X. See photo. 5/

You May Also Like