Normal Topic Possible Polygraph Dragnet in Investigation of Leak of Classified Documents on Israeli Preparations to Attack Iran (Read 288 times)
Paste Member Name in Quick Reply Box George W. Maschke
Global Moderator
*****
Offline


Make-believe science yields
make-believe security.

Posts: 6229
Joined: Sep 29th, 2000
Possible Polygraph Dragnet in Investigation of Leak of Classified Documents on Israeli Preparations to Attack Iran
Today at 7:13am
Mark & QuoteQuote Print Post  
CNN reports on the leak of classified U.S. documents on Israel's preparations for an attack on Iran. Excerpt:

Quote:
https://www.cnn.com/2024/10/19/politics/us-israel-iran-intelligence-documents/in...

(CNN) — The US is investigating a leak of highly classified US intelligence about Israel’s plans for retaliation against Iran, according to three people familiar with the matter. One of the people familiar confirmed the documents’ authenticity.

The leak is “deeply concerning,” a US official told CNN.

The documents, dated October 15 and 16, began circulating online Friday after being posted on Telegram by an account called “Middle East Spectator.”

They are marked top secret and have markings indicating they are meant to be seen only by the US and its “Five Eyes” allies — Australia, Canada, New Zealand and the United Kingdom.

They describe preparations Israel appears to be making for a strike against Iran. One of the documents, which says it was compiled by the National Geospatial-Intelligence Agency, says the plans involve Israel moving munitions around.

Another document says it is sourced to the National Security Agency and outlines Israeli air force exercises involving air-to-surface missiles, also believed to be in preparation for a strike on Iran. CNN is not quoting directly from or showing the documents.

A US official said the investigation is examining who had access to the alleged Pentagon document. Any such leak would automatically trigger an investigation by the FBI alongside the Pentagon and US intelligence agencies. The FBI declined to comment.

...


While CNN "is not quoting directly from or showing the documents," which were first published by the Telegram channel Middle East Spectator, they are readily available online, and I have attached them to this post.

Polygraph screening is commonly used in counterintelligence investigations, and it seems likely that suspects in this leak investigation may be required to undergo polygraph screening.

If you are a federal employee or contractor who has been directed to submit to polygraph screening, I would be interested in hearing from you about that. You can reach me anonymously and securely via AntiPolygraph.org's Signal account (ap_org.01) or via our new SimpleX account.

To my knowledge, no polygraph dragnet has ever led to the identification of a leaker.
« Last Edit: Today at 9:32am by George W. Maschke »  

George W. Maschke
I am generally available in the chat room from 3 AM to 3 PM Eastern time.
Tel/SMS: 1-202-810-2105 (Please use Signal Private Messenger or WhatsApp to text or call.)
E-mail/iMessage/FaceTime: antipolygraph.org@protonmail.com
Wire: @ap_org
Threema: A4PYDD5S
Personal Statement: "Too Hot of a Potato"
Back to top
IP Logged
 
Paste Member Name in Quick Reply Box George W. Maschke
Global Moderator
*****
Offline


Make-believe science yields
make-believe security.

Posts: 6229
Joined: Sep 29th, 2000
Re: Possible Polygraph Dragnet in Investigation of Leak of Classified Documents on Israeli Preparations to Attack Iran
Reply #1 - Today at 9:03am
Mark & QuoteQuote Print Post  
In my post above (now corrected), I incorrectly indicated that these classified documents were first published by the Telegram channel Middle East Spectator.

The channel, which is run by journalists, has published the attached notice, stating, among other things, "As far as we are aware, the documents first appeared in a private Telegram group with just over 7000 members, where the leaker was likely present. Somehow, the documents found their way out of the group; it was at this moment that Middle East Spectator took notice of the documents through an anonymous DM. Such DMs were sent to various other people and news outlets."
  

George W. Maschke
I am generally available in the chat room from 3 AM to 3 PM Eastern time.
Tel/SMS: 1-202-810-2105 (Please use Signal Private Messenger or WhatsApp to text or call.)
E-mail/iMessage/FaceTime: antipolygraph.org@protonmail.com
Wire: @ap_org
Threema: A4PYDD5S
Personal Statement: "Too Hot of a Potato"
Back to top
IP Logged
 
Paste Member Name in Quick Reply Box George W. Maschke
Global Moderator
*****
Offline


Make-believe science yields
make-believe security.

Posts: 6229
Joined: Sep 29th, 2000
Re: Possible Polygraph Dragnet in Investigation of Leak of Classified Documents on Israeli Preparations to Attack Iran
Reply #2 - Today at 9:22am
Mark & QuoteQuote Print Post  
On X, user @DanLinnaeus posted on 17 October 2024:

Quote:
URGENT | Significant leaks of highly classified U.S. Department of Defense (DoD), National Security Agency (NSA) and numerous related agency materials have occurred over the past 72 hours. Due to the sensitive nature of the information, specific details will remain undisclosed and should not be disseminated. 

A batch of material was released by a single propagator in a channel with over 7,000 subscribers. At the time 285 were logged into the system. Another leak was released to a major open channel with over 140,000 subscribers with over 200 direct responses to the leaked content.

The information is marked TS, TK and NOFORN among numerous other specific classifications.

The DoD has been alerted through secure communication channels; however, classified data continues to surface on back channels and open-source intelligence platforms. The volume, immediacy and relevance to ongoing operations of the disseminated material suggest severe breaches within U.S. security protocols, pointing to vulnerabilities in information safeguarding and operational security measures requiring immediate action.


He followed up an hour later with the following post:

Quote:
Jack Teixeira, a low ranking member of an intelligence unit in the Massachusetts Air National Guard, was arrested in April 2023 for “allegedly” leaking highly classified U.S. military documents online. Teixeira had access to sensitive information through his role and (is accused of) posting the documents on a Discord server, but got off lightly.

The leniency may have been because of his relatively low-ranking position, which his defense used to emphasize a lack of intent to cause harm. But the case underscores larger systemic failures in safeguarding classified information.

The material I have seen is far more recent than Teixeira’s material. Much of it from 2024, some from September and October. Some from the last 24-48 hours.

It reads authentic, with correct classification markings, tiers, consistent control numbers, and detailed handling protocols. For my own safety, I reviewed only the document lists and some cover pages without reading the contents or downloading material. 

Instead I notified DoD directly and furnished them with the direct sources and circumstances of the leaks. If the material is in fact authentic (which I assume is highly likely), it is extremely sensitive and spans multiple agencies.

I would never post something like this unless I was gravely concerned. While I notified DoD directly I am not certain of follow through as material continues to appear dated after the report I submitted. I am hoping that users who see this will approach their representatives and contacts to alert them to the possibility of a serious breach to prompt relevant authorities (FBI, CISA, etc.) to take immediate action mitigating as necessary.


Linnaeus' comments suggest that more documents than the two pages published by Telegram channel Middle East Observer were published on the private Telegram channel cited by Middle East Observer as their source.
  

George W. Maschke
I am generally available in the chat room from 3 AM to 3 PM Eastern time.
Tel/SMS: 1-202-810-2105 (Please use Signal Private Messenger or WhatsApp to text or call.)
E-mail/iMessage/FaceTime: antipolygraph.org@protonmail.com
Wire: @ap_org
Threema: A4PYDD5S
Personal Statement: "Too Hot of a Potato"
Back to top
IP Logged
 
Paste Member Name in Quick Reply Box George W. Maschke
Global Moderator
*****
Offline


Make-believe science yields
make-believe security.

Posts: 6229
Joined: Sep 29th, 2000
Re: Possible Polygraph Dragnet in Investigation of Leak of Classified Documents on Israeli Preparations to Attack Iran
Reply #3 - Today at 12:19pm
Mark & QuoteQuote Print Post  
Dan Linnaeus has posted to X new details about the leaked and as-yet not publicly published documents that he saw on the private Telegram channel from which the two published documents seem to have originated:

Quote:
TIMING ⏱️ The public leak from the Iranian social media channel, consisting of a single document detailing the U.S. military’s observations of Israel’s movements and preparations, was preceded by a considerably larger spill in a relatively closed environment just a few days earlier.

This spill spans hundreds of documents across multiple agencies, highly likely including documents pre-April 2023 that were already known breaches, as opposed to solely unknown ones from that period.  However, it also exposed late 2023 and 2024 material, some as recent as September. It spans multiple theaters across numerous agencies, indicating wide systemic breaches.

This is inclusive of a document list, a three and a half minute video scrolling through the opening pages (1-2) of the breached documents, and a two and half minute video scrolling through documents and much of their contents. These contents read authentic, with correct classification markings, tiers, consistent control numbers, and detailed handling protocols. 

It includes highly sensitive and classified material marked TS, SCI, TK and NOFORN, inclusive of CIA reports, NSC assessments, JCS pre-class drafts and J2 USAF ELINT operations reports, DOD Modernization Strategies, CNMF assessments, CTF-153 plans, Office of the Undersecretary of Defense internal review drafts for acquisitions documents, R&E documents, Secret Service Reports on TCO laundering operations, Special Advisory Council on ME Affairs Pentagon reports ….

….it's vast. This list is gleaned just from going back momentarily to the source to check if it’s still up and skimming through some of the cover pages to get a sense of the scope and breadth of the security breach. It’s unlikely that one could provide a more detailed sense of what is involved without going through the list in a manner that compromises them and inadvertently participates in the breaches.

But most of the spilled material is selective and controlled, with only the first page or a few pages released. Beyond the obvious threat imbued in such a move it appears aimed at demonstrating operational security has been compromised, forcing the U.S. and allied partners to reassess and potentially delay or halt ongoing operations.

This is noteworthy, as Barack Ravid, a known conduit for the U.S. administration’s official leaks reported on the October 17 spill, sayin that senior U.S. officials told him that they are treating this as “an extremely serious incident, but noted that they believe the leak will not impact Israel’s operational plans.” 

In short, there appears to be the public message and a private message from the propagators: ‘You don’t know what we know,’ appears to be the public signal. But privately the message appears to be ‘We have compromised your entire operation and should you engage, you don’t know how prepared we may be.’ 

So finally: Is it plausible that the Israeli operation against Iran has been delayed pending opsec assessments, despite the assessments of ‘senior U.S. officials’ shared with the public through their official conduit, Barack Ravid? Moreover, who in the U.S. stands to gain from delaying, compromising or otherwise deterring an Israeli operation on Iran, or causing the US military to pull back operationally as it reassesses potential systemic breaches and attending implications? If anyone, shouldn’t they be scrutinized for their potential involvement in these leaks?


I expect that there is a Snowden-level shitstorm raging in the intelligence community over this security breach. As noted previously on the blog, a DoD polygrapher in 2016 mentioned that in the aftermath of NSA whistleblower Edward Snowden's 2013 revelations, the number of polygraph examinations administered by the Department of Defense tripled.
  

George W. Maschke
I am generally available in the chat room from 3 AM to 3 PM Eastern time.
Tel/SMS: 1-202-810-2105 (Please use Signal Private Messenger or WhatsApp to text or call.)
E-mail/iMessage/FaceTime: antipolygraph.org@protonmail.com
Wire: @ap_org
Threema: A4PYDD5S
Personal Statement: "Too Hot of a Potato"
Back to top
IP Logged
 
Possible Polygraph Dragnet in Investigation of Leak of Classified Documents on Israeli Preparations to Attack Iran

Please type the characters that appear in the image. The characters must be typed in the same order, and they are case-sensitive.
Open Preview Preview

You can resize the textbox by dragging the right or bottom border.
Insert Hyperlink Insert FTP Link Insert Image Insert E-mail Insert Media Insert Table Insert Table Row Insert Table Column Insert Horizontal Rule Insert Teletype Insert Code Insert Quote Edited Superscript Subscript Insert List /me - my name Insert Marquee Insert Timestamp No Parse
Bold Italicized Underline Insert Strikethrough Highlight
                       
Change Text Color
Insert Preformatted Text Left Align Centered Right Align
resize_wb
resize_hb







Max 200000 characters. Remaining characters:
Text size: pt
More Smilies
View All Smilies
Collapse additional features Collapse/Expand additional features Smiley Wink Cheesy Grin Angry Sad Shocked Cool Huh Roll Eyes Tongue Embarrassed Lips Sealed Undecided Kiss Cry
Attachments More Attachments Allowed file types: txt doc docx ics psd pdf bmp jpe jpg jpeg gif png swf zip rar tar gz 7z odt ods mp3 mp4 wav avi mov 3gp html maff pgp gpg
Maximum Attachment size: 500000 KB
Attachment 1:
X