Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Here’s the e-mail trick Petraeus and Broadwell used to communicate
Washington Post ^

Posted on 11/12/2012 6:34:11 PM PST by TigerClaws

CIA Director David Petraeus and Paula Broadwell, a former military intelligence officer and his biographer, adopted a well-worn online trick, in an apparent attempt to keep their communications secret.

(Excerpt) Read more at m.washingtonpost.com ...


TOPICS: Crime/Corruption; Foreign Affairs; Government; News/Current Events
KEYWORDS:

1 posted on 11/12/2012 6:34:13 PM PST by TigerClaws
[ Post Reply | Private Reply | View Replies]

To: TigerClaws

Anything put on the internet in any shape or form can be read by anyone with just a little knowledge. And is there FOREVER.

The irony - old fashion just talking or sending a letter through snail mail may be the most secure.


2 posted on 11/12/2012 6:40:17 PM PST by 2banana (My common ground with terrorists - they want to die for islam and we want to kill them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2banana

the reason I use email is I want a record


3 posted on 11/12/2012 6:41:51 PM PST by yldstrk (My heroes have always been cowboys)
[ Post Reply | Private Reply | To 2 | View Replies]

To: TigerClaws

tactic of terrorists

spy film “Traitor.”

teen-agers

CIA Director David Petraeus


4 posted on 11/12/2012 6:46:39 PM PST by Berlin_Freeper (Unbelievable / Believable!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws
Oh!, what a tangled web we weave when first we practice to deceive.

It reminds me of a story that occurred in my neck of the woods not too long ago.

Charles Wang, the founder and former CEO of Computer Associates (now known as CA) never used e-mail. He was the mastermind behind a billion dollar fraud that made him a very wealthy man.

Meanwhile, his minions (including Sanjay Kumar) spilled their guts (via e-mail) and were destroyed by the Feds.

Lesson learned.

5 posted on 11/12/2012 6:47:04 PM PST by UnBubba
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

US Media to US Citizens: “LOOK! SQUIRREL!!!”


6 posted on 11/12/2012 6:52:27 PM PST by Caipirabob (Communists... Socialists... Democrats...Traitors... Who can tell the difference?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws
So they find her account and the General is sharing the account. Interesting that Broadwell didn't think about that part of the audit trail.
7 posted on 11/12/2012 6:53:50 PM PST by Rashputin (Jesus Christ doesn't evacuate His troops, He leads them to victory.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: UnBubba
Oh!, what a tangled web we weave when first we practice to deceive.

Which is why it's best to be honest.

8 posted on 11/12/2012 6:54:03 PM PST by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 5 | View Replies]

Comment #9 Removed by Moderator

To: Caipirabob
"“LOOK! SQUIRREL!!!”"

My dog can catch the occasional squirrel.

10 posted on 11/12/2012 6:59:45 PM PST by Paladin2 (.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: yldstrk

Bingo.

A well-covered arse is a happy arse.


11 posted on 11/12/2012 7:02:43 PM PST by Condor 63
[ Post Reply | Private Reply | To 3 | View Replies]

To: TigerClaws
"Rather than transmitting emails to the other’s inbox, they composed at least some messages and instead of transmitting them, left them in a draft folder or in an electronic “dropbox,” the official said. Then the other person could log onto the same account and read the draft emails there. This avoids creating an email trail that is easier to trace"

Oh for crying out loud! Thanks General Petraeus.

Everything into and out of a communications pipe it tracked. This has been in place in the corporate world for at least 20 years based on my experience. I was a consultant in a civil case like this waaaay back...

12 posted on 11/12/2012 7:04:17 PM PST by uncommonsense (Conservatives believe what they see; Liberals see what they believe.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

google mail... monitored by the NSA ... every key you click

exactly how does the head of the CIA not understand this?

how can ANYONE become the head of our intelligence organization and have such horrid security practices??

doesn’t smell right

I’m leaning towards setup to keep him from testifying on Benghazi


13 posted on 11/12/2012 7:08:10 PM PST by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

Patraeus should have heeded the old dictum: Wrong no man — write no woman.


14 posted on 11/12/2012 7:08:10 PM PST by USFRIENDINVICTORIA
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2banana

“they’ can read through paper these days ~ if they want ~ and no one in USPS would detect the installation of the equipment to do the job.


15 posted on 11/12/2012 7:11:37 PM PST by muawiyah
[ Post Reply | Private Reply | To 2 | View Replies]

To: USFRIENDINVICTORIA; All

Nice line.

Look, this is all over the driveby media. It’ll all lead back to Benghazi and hurt the administration.


16 posted on 11/12/2012 7:12:05 PM PST by TigerClaws
[ Post Reply | Private Reply | To 14 | View Replies]

To: sten

he may be part of it gang ~


17 posted on 11/12/2012 7:12:33 PM PST by muawiyah
[ Post Reply | Private Reply | To 13 | View Replies]

To: UnBubba
Charles Wang, the founder and former CEO of Computer Associates (now known as CA) never used e-mail. He was the mastermind behind a billion dollar fraud that made him a very wealthy man.

Meanwhile, his minions (including Sanjay Kumar) spilled their guts (via e-mail) and were destroyed by the Feds.

Interesting. I worked for CA in the late 80's and knew both of them. I recall that Wang always carried around a paper notebook in which he wrote all his notes.

18 posted on 11/12/2012 7:12:45 PM PST by matt1234
[ Post Reply | Private Reply | To 5 | View Replies]

To: TigerClaws

stars may get you women but women will get your stars/ edited from

your badge may get you $%##^ but ^&*%^ will get your badge...advice given to new LEO’s everywhere


19 posted on 11/12/2012 7:20:33 PM PST by rolling_stone
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #20 Removed by Moderator

To: TigerClaws

I have to give credit that they at least didn’t use MyFace.


21 posted on 11/12/2012 7:24:04 PM PST by Rebelbase (The most transparent administration ever is clear as mud.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

Unencrypted on Google’s server, and he was our chief spook??

Okay, plain text in a drop box accessed only through a Tor router might count as a sort of steganography, since no one not privy to its existence and (virtual) location would even think to look for it, but unencrypted on Google’s servers in an account identifiably belonging to one of the principals???

(It’s not like folks having an affair have problems with implementing a key agreement protocol.)


22 posted on 11/12/2012 7:27:39 PM PST by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know...)
[ Post Reply | Private Reply | To 1 | View Replies]

Paraphrasing a radio commentator:

If the Head of Intelligence doesn’t know how to keep an affair secret, maybe he isn’t so intelligent.


23 posted on 11/12/2012 7:28:27 PM PST by D-fendr (Deus non alligatur sacramentis sed nos alligamur.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: OneWingedShark
YOU SIR HAVE HIT THE NAIL ON THE HEAD!!

In 1564 Musashi, one of the greatest sword masters in Japanese history wrote, in "A Book of Five Rings" about 9 things a man must know or do to be a success - Do not think dishonestly was one of them. Ten years ago the ten secrets to success as produced by interviews with 100+ successful business people - #10 Be Honest or the first 9 don't matter.

24 posted on 11/12/2012 7:53:49 PM PST by q_an_a (the more laws the less justice)
[ Post Reply | Private Reply | To 8 | View Replies]

To: TigerClaws

Pretty clever.


25 posted on 11/12/2012 7:59:52 PM PST by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

Trying to be anonymous on the Internet is a losers game.

Best you can possibly do is encrypt content with PGP which will raise all sorts of red flags and the sender’s and recipient’s IPs, which can then be used to find names, are still out there.

Best way to communicate would be talking/texting between two throwaway cellphones.


26 posted on 11/12/2012 8:02:45 PM PST by expat1000
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rashputin
So they find her account and the General is sharing the account. Interesting that Broadwell didn't think about that part of the audit trail.

Funny, isn't it? What I find most amusing is that they were using a 'shared' gmail account. Gmail is the least private email that I can imagine - even the drafts are scanned and mined for data, and thus, copies are cached on their servers. Plus, by loggin in, the account data will provide the IP addresses where the log-ins came from. Surely he was smart enough to use TOR or a string of anonymous proxy servers............well, he was using gmail, so I guess all bets are off on further security. Now, temporary hushmail accounts that self deleted on a daily basis logged into through TOR, now we are STARTING to get private. Idiots!

27 posted on 11/12/2012 8:31:50 PM PST by RobertClark (Inside every "older" person is a younger person wondering what the hell happened?)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Rashputin
So they find her account and the General is sharing the account. Interesting that Broadwell didn't think about that part of the audit trail.

Funny, isn't it? What I find most amusing is that they were using a 'shared' gmail account. Gmail is the least private email that I can imagine - even the drafts are scanned and mined for data, and thus, copies are cached on their servers. Plus, by loggin in, the account data will provide the IP addresses where the log-ins came from. Surely he was smart enough to use TOR or a string of anonymous proxy servers............well, he was using gmail, so I guess all bets are off on further security.

Now, temporary hushmail accounts that self deleted on a daily basis logged into through TOR, now we are STARTING to get private. Idiots!

28 posted on 11/12/2012 8:32:08 PM PST by RobertClark (Inside every "older" person is a younger person wondering what the hell happened?)
[ Post Reply | Private Reply | To 7 | View Replies]

To: expat1000
Best way to communicate would be talking/texting between two throwaway cellphones

and even those can be tied to time and location by tower triangulation. Get new ones every week or so and pay cash.

29 posted on 11/12/2012 8:56:41 PM PST by from occupied ga (Your government is your most dangerous enemy)
[ Post Reply | Private Reply | To 26 | View Replies]

To: TigerClaws

We should not be looking at the man’s personal email. We live in a total surveillance society.


30 posted on 11/12/2012 9:27:01 PM PST by TBP (Obama lies, Granny dies.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: USFRIENDINVICTORIA; TigerClaws
Patraeus should have heeded the old dictum: Wrong no man — write no woman.

Or as a former basketball coach of mine used to say, "Keep your lovin' in your pants and keep your pants zipped."

31 posted on 11/12/2012 9:32:39 PM PST by Alaska Wolf (USA!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: TBP
We should not be looking at the man’s personal email.

I agree completely. Mind you, Petraeus did not imbibe tradecraft with his mother's milk, but even so one-time pads to conceal love notes is a bit of overkill.

What we see here is a bit of agenda peeping through. The reporter is mocking the inadequacy of communications security for two people who were apparently having an affair. This is our business precisely why? And if he had employed the full force of his agency's technical expertise in concealing the affair, would this not have been an outrageous abuse of power?

An extramarital affair in Washington, DC, possibly the first that has ever taken place there. Or not. Why is this even news? Why the sudden national focus on two bed-hopping adults? What is it serving to conceal?

Benghazi, of course. This is a smokescreen so obvious that the stink of desperation pervades it. The General has just had a taste of what happens if he talks. It's the Chicago Way.

32 posted on 11/12/2012 9:48:11 PM PST by Billthedrill
[ Post Reply | Private Reply | To 30 | View Replies]

Comment #33 Removed by Moderator

To: yldstrk

Though I have an FR name it doesn’t really bother me to think someone would like to know who I am. Anything they take off my computer would only be what I would be glad to have shared with the world.


34 posted on 11/12/2012 10:14:05 PM PST by noinfringers2
[ Post Reply | Private Reply | To 3 | View Replies]

To: OneWingedShark

Learning some basic trade craft(dead drops,cut outs,anonymous e-mail software) doesn’t hurt either.


35 posted on 11/12/2012 11:53:16 PM PST by Nebr FAL owner
[ Post Reply | Private Reply | To 8 | View Replies]

To: Billthedrill

It is our business since it leaves the man open to blackmail . The honey trap is literally one the oldest & widest used tactics for getting people to spy against/betray their country.The general was not schooled at all in even the basics of tradecraft. Surely the head of the CIA is given at least a rudimentary class on the most basic of fundamentals of the spy business.


36 posted on 11/13/2012 12:18:32 AM PST by Nebr FAL owner
[ Post Reply | Private Reply | To 32 | View Replies]

To: Billthedrill
The reporter is mocking the inadequacy of communications security for two people who were apparently having an affair.

Their level of security was perfectly adequate if the purpose was simply to conceal their affair.

The problem arose when she got paranoid about a possible rival, and then decided, tradecraft be damned, to let the cat-fight begin! Not realizing, of course, that the target of the cat fight might enlist the powers of the shirtless FBI.

It astounds me that a top West Point grad with experience in intelligence work would hit Send multiple times not considering that IP addresses and locations can be tracked and correlated with book tours and hotel stays and accesses to other accounts. LOL!

37 posted on 11/13/2012 12:38:03 AM PST by cynwoody
[ Post Reply | Private Reply | To 32 | View Replies]

To: TigerClaws

If only he was the only man in Washington to have an affair! Every president did the same thing - even carter with the lust thing. JFK nailed everyone, Ike had his military driver.....etc.

The media makes a a mountain out of this when the real story is Benghazi.


38 posted on 11/13/2012 4:32:03 AM PST by New Jersey Realist (America: home of the free because of the brave)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Berlin_Freeper

The trick is use two accounts. Use one hotmail for your outgoing and use gmail for her outgoing. You know when it’s been read because its been deleted and the response is in the other one.

Of course you don’t mention the other box or write names.

These guys are idiot.


39 posted on 11/13/2012 4:41:47 AM PST by Vermont Lt (The dude abides.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Alaska Wolf

My high school football coach used to tell us on thursday before a game that he wanted us in bed by 9 and up and headed home by 10!


40 posted on 11/13/2012 4:52:42 AM PST by dalereed
[ Post Reply | Private Reply | To 31 | View Replies]

To: TigerClaws; penelopesire; LucyT; hoosiermama; Protect the Bill of Rights; MestaMachine
Petraeus and Broadwell apparently used a trick, known to terrorists and teen-agers alike, to conceal their email traffic, one of the law enforcement officials said.

Rather than transmitting emails to the other’s inbox, they composed at least some messages and instead of transmitting them, left them in a draft folder or in an electronic “dropbox,” the official said. Then the other person could log onto the same account and read the draft emails there. This avoids creating an email trail that is easier to trace.

41 posted on 11/13/2012 5:02:46 AM PST by maggief
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson