Ordföljd sfi kurs b
Hem / Utbildning & Karriär / Ordföljd sfi kurs b
Brennan used the account occasionally for several intelligence related projects.
John Brennan became the Director of the Central Intelligence Agency in March 2013, replacing General David Petraeus who was forced to step down after becoming embroiled in a classified information mishandling scandal. If you face legal action
If a legal action is brought against you as a result of your submission, there are organisations that may help you.
(7 November 2008, Author: Louis Tucker)
Download PDF or view HTML version.
Contacts
A list of contacts as stored in the AOL email account of John Brennan. TAC seems to have lost a tender for a US watchlist-related software project to a competitor. (27 November 2008, Metadata Author: Marcie Roth)
Download PDF or view HTML version.
Afghanistan-Pakistan Executive Summary
Recommendations for a USG strategy in the Afghanistan-Pakistan (AF-PK) region.
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. When Obama and Biden entered into power, Brennan was lifted up on high, resulting in his subsequent high-level national security appointments.
These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a "hidden" CIA server called 'Blot'.
The cover domain delivers 'innocent' content if somebody browses it by chance. If you face legal action
If a legal action is brought against you as a result of your submission, there are organisations that may help you.
(17 November 2008, Author: John Brennan)
Download PDF or view HTML version.
The Analysis Corporation
FAX from the General Counsel of the CIA to the Goverment Accountability Office about a legal quarrel between the CIA and "The Analysis Corporation". In 2008 Brennan became a donor to Obama. The same year TAC, led by Brennan, became a security advisor to the Obama campaign and later that year to the Obama-Biden Transition Project.
If you used flash media to store sensitive data, it is important to destroy the media.
If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.
4. Remove traces of your submission
If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure.
If you have similar official documents that have not been published yet, submit them to WikiLeaks.
Unidentified Brennan Group
Table of 22 people, including John Brennan, that are members of a currently unidentified group. (15 February 2008, Sender: CIA, Office of General Counsel, Larry Passar)
Download PDF or view HTML version.
Draft: Intel Position Paper
Challenges for the US Intelligence Community in a post cold-war and post-9/11 world; a calling for inter-agency cooperation, a ten-year term for the Director of the CIA and the Director of National Intelligence.
(15 July 2007, Author: John Brennan)
Download PDF or view HTML version.
The Conundrum of Iran
Recommendations to the next President (assuming office in Jan. 2009) on how to play the figures on the U.S.-Iranian Chessboard (18 November 2007, Author: John Brennan)
Download PDF or view HTML version.
Torture
Letter from Vice Chairman Bond, Senate Select Committee on Intelligence, to his fellow board members with a proposal on how to make future interrogation methods "compliant" and "legal".
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities.
"perfectly-boring-looking-domain.com") for its own use.
This form, filled out by Brennan himself before he assumed his current position, reveals a quite comprehensive social graph of the current Director of the CIA with a lot of additional non-govermental and professional/military career details. It mostly contains email addresses (people in active email exchange with the account holder) as well as some Instant-Messenger IDs (AIM).
Download original TXT.
John Brennan Draft SF86
"National Security Position" form for John Brennan.
It is during this period many of the Obama administration's key strategic policies to China, Iran and "Af-Pak" were formulated.