By the first half of 2004, the National Security Agency was drowning in information. It had amassed 85 billion phone and online call records and cut the ribbon on a new hacking center in Hawaii — but it was woefully short on linguists who could make sense of captured communications and lacked enough network analysts to effectively monitor all the systems it had hacked.
The signals intelligence collected by the agency was being used for critically important decisions even as NSA struggled to understand it. Some bombs in Iraq were being targeted based entirely on signals intelligence, a senior NSA official told staff at the time — with decisions being made in a matter of “minutes” with “less and less review.”
Information overload is just one of several themes running through 262 articles from the NSA’s internal news site, SIDtoday, which The Intercept is now releasing after careful review. The documents also detailed an incident in which the Reagan administration appears to have leaked classified intelligence to the press for political purposes, described in an accompanying article by reporter Jon Schwarz.
SIDtoday articles published today also describe how the NSA trained FBI agents, enabled U.S. intervention in Latin America, and, with the help of a gifted analyst at the Defense Intelligence Agency, learned the value of simply reading information that was already public. One document even suggests that NSA personnel routinely got dangerously chatty at restaurants near headquarters. These stories and more are described in the highlights reel below. The NSA declined to comment.
A top NSA official disclosed in a January 2004 SIDtoday column that U.S. forces were “dropping bombs” based entirely on signals intelligence, the type of intelligence collected by the agency. He then implied that the American officers involved risked prosecution for war crimes.
Charles Berlin, chief of staff in the Signals Intelligence Directorate, recounted an anecdote about a former commander of his who, in one session in the winter of 1995-96, personally reviewed more than 100 possible airstrike targets in the Balkans. The commander’s motivation, Berlin said, was to protect his underlings from being prosecuted for war crimes, and his actions “really brought home the concepts of responsibility and accountability.”
“For us today this lesson is especially important,” he added. “The planning cycle for dropping a bomb has compressed from a day to minutes and the criterion for the aiming point has less and less review.”
“As many of you know, our forces in Iraq are dropping bombs on the strength of SIGINT alone. We are proud of their confidence in us, but have you ever considered the enormous risk the commanders are assuming in this regard? Are you ready to share that risk?”
Among the ways the NSA identified potential terrorists was through a practice known as “information chaining,” which uses communications metadata to draw a social graph. And there’s no question the agency had lots of metadata: As of 2004, the NSA had amassed a database of more than 85 billion metadata records related to phone calls, billing, and online calls — and was adding 125 million records a day, according to a January 2004 SIDtoday article titled “The Rewards of Metadata.”
The database, known as FASCIA II, would at some unspecified point in the future begin processing 205 million records a day and storing 10 years of data, the article added. One of the world’s largest Oracle databases at the time, FASCIA II held metadata records from telephone calls, wireless calls, billing, the use of media over the internet, and high-powered cordless phones, with plans to add email metadata in the future.
The article explained that metadata is used by the agency in the process of “information chaining,” in which analysts spy on relationships between people. It further claimed that two senior al Qaeda operatives had been captured with the help of such techniques. A March 2004 SIDtoday article said a chaining tool called MAINWAY helped a counterterrorism analyst uncover six new “terrorist-related numbers.”
It’s one thing to collect phone calls, email messages, and other signals intelligence. It’s quite another to make sense of it. Several SIDtoday articles from the first half of 2004 made clear that the NSA was falling far short in its attempts to process communications conducted in languages other than English.
Only half of the agency’s more than 2,300 “language missions” worldwide had qualified personnel, according to a June 2004 SIDtoday article by an NSA “senior language authority.” The author declared that “this shortcoming must be rectified.” An NSA report to an oversight council, quoted in the article, said that the lack of qualified language analysts was particularly acute in the “Global War on Terrorism.”
Exacerbating the situation was the fact that captured communications require a high level of linguistic proficiency to understand. “The cryptologic language analyst must be able to read and listen ‘between the lines’ to unformatted, unpredictable discourse,” as the article put it. Only a quarter of military cryptologic linguists, who formed the vast majority of the workforce, could work at this level, known as “level 3” proficiency, while barely half of the civilian cryptologic linguists could, according to a follow-up SIDtoday article. The military’s language training institute offered “virtually no existing curriculum” above level 2.
NSA’s plan to address the problem included reforms to the training institute and on-site instruction to bring existing linguists up to higher levels. The agency planned to invest about $80 million per year in training over five years. Other efforts included an internal online language training tool, an evaluation of redundant Arabic machine translation projects underway in various government agencies, and the formation of a language technology team within the NSA.
Sometimes metadata isn’t enough and the NSA decides it needs to compromise targets’ computers to collect much more data. The first half of 2004 saw a ramp-up of NSA’s hacking capabilities. In March, SIDtoday reported, the agency’s elite hacking team Tailored Access Operations approved Kunia Regional Security Operations Center in Hawaii — the same facility where Edward Snowden later worked — as the first NSA field office to conduct “advanced” Computer Network Exploitation. Other facilities conduct the first stage of hacking, “target mapping,” but the Kunia facility began doing “vulnerability scanning” all the way through to “sustained SIGINT collection.”
Another March SIDtoday article said that an advanced network analysis division used to help “exploit targets of interest” had “played an instrumental part” in capturing alleged al Qaeda operative Husam al-Yemeni, had developed a “more complete understanding of the Pakistani Army Defense Network (ADN) infrastructure,” and had assisted with the hacking of “an important digital network associated” with the leader of Venezuela at the time, referred to erroneously as “Victor Chavez.”
The NSA was so successful at hacking networks that the agency was overwhelmed with information. “We simply do not have enough network analysts to effectively monitor these targeted networks,” an NSA division chief wrote in an April 2004 SIDtoday article. To solve the problem, the agency began prototyping an automated monitoring system.
Even as the NSA made enormous efforts to collect vast quantities of private communications, a lone SIDtoday article extolled the value of publicly available data. The piece, from May 2004, gushed about a Defense Intelligence Agency analyst who dug up leads by poring over Russian material that was “open source.” The DIA bookworm searched in newspapers, government documents, and “obscure websites” for information that aided the NSA in collecting intelligence, including names, telephone numbers, and addresses. The article, co-authored by an NSA director with responsibility for Russia, praised the analyst’s “outstanding language and research skills.” It turned out that “critical lead information” on Russian underground facilities, including a mysterious and widely discussed site at Yamantau Mountain in the Urals, was “often only available in open source literature, such as the Internet.”
Knowing how much intelligence value could be reaped from openly circulated information, the NSA worked to encourage discretion among members of its workforce. NSA employees practiced poor operational security on a “monthly” basis by disclosing too much information in restaurants and other public settings near the agency’s Fort Meade headquarters, an agency security manager indicated in a tutorial on operational security that ran in SIDtoday in April 2004.
The article used a hypothetical scenario to explain why operational security, or OPSEC, was important for everyone. The author, OPSEC manager for the NSA’s Signals Intelligence Directorate, wrote: “You’re at a luncheon at a local restaurant to bid farewell to Sue, a co-worker who is moving on to a new office.” Your boss makes a toast to Sue, describing her contributions against organized crime and offering various details of her work. Sue then gives a toast thanking some of the gathered individuals.
“Sound familiar?” the OPSEC manager asked. “Then you’ve witnessed (or perhaps participated in) a demonstration of poor OPSEC. … Have you ever stopped to consider what your unclassified public discussions might be giving away? Take the scenario, for instance. This is a scene that is played out monthly in the Fort Meade area.” The article went on to list the pieces of information that an adversary, who could have been listening in from a nearby table, would have learned.
OPSEC turned out to be a recurring theme for SIDtoday — OPSEC training is, after all, mandatory for all NSA personnel. A January 2004 article, written by the author of the April 2004 piece, listed some tips to help personnel to apply OPSEC to their day-to-day activities: Identify your critical information, analyze the threat, identify vulnerabilities, assess risk, and apply countermeasures.
NSA employees aren’t the only ones trained to practice good OPSEC. A March 2005 article reported that the leaders of Venezuela and Cuba practiced OPSEC successfully. President Bush considered Venezuelan President Hugo Chavez a “threat to democracy in the region and a threat to U.S. interests in particular.” But “from a SIGINT perspective, Venezuela poses a particularly difficult challenge. With Castro as his mentor, Chavez has learned the importance of communications security and has made sure that his subordinates understand this as well.”
Various 2004 SIDtoday articles highlight the NSA’s behind-the-scenes work on behalf of federal law enforcement.
One detailed a two-week training course on “intelligence reporting” given by NSA staff to FBI officers working on terrorism cases. The course, which had a component dubbed “SIGINT Reporting 101,” aimed to provide “insight into the complexity and difficulty of our business” and to dispel “Hollywood myths about the NSA.”
Another SIDtoday article showed how the U.S. Coast Guard was able to interdict a boat carrying 3.2 metric tons of cocaine thanks to the NSA’s monitoring of VHF radio signals, which carried voice communications of narcotraffickers. An official Coast Guard history of the incident elides the NSA’s role. The same SIDtoday article also disclosed that the Colombian air force carried out a strike against a suspected trafficker aircraft after a tip-off from the NSA.
Colombian guerrillas holding American hostages evaded massive NSA surveillance, according to a February 2004 SIDtoday article.
One year after three American contractors, who had been on a surveillance mission for the U.S. military, were captured by the Revolutionary Armed Forces of Colombia, a Marxist guerilla group, the U.S. “has not been able to determine with high confidence the exact location and status of the hostages,” wrote an NSA account manager for the military’s Southern Command. This despite “hundreds” of U.S. government personnel having worked to gain their release. U.S. efforts were stymied when FARC’s leadership ordered that personnel cease mentioning hostage operations directly in their communications; the best the NSA could achieve at the time of the SIDtoday article was to monitor calls between two radio operators, “Paula and Adriana,” who in turn were connected to the FARC leaders “we strongly suspect are linked to the hostages.”
The author of the SIDtoday article added that the agency continued to try and get a fix on the location of the hostages. Yet their captors eluded the Americans for another four years. The three Americans were freed by Colombian commandos in July 2008.
A March 2004 SIDtoday article noted a success against FARC, bragging that the arrest of FARC financial leader Anayibe Rojas Valderrama, known as “Sonya,” and a number of her associates a month earlier “resulted from years of monitoring. … Accurate geolocational data as to where she was and when, allowed a vetted Colombian team to capture them by surprise and without any loss of life.” Valderrama was extradited to the United States where she was tried and convicted on drug trafficking charges in 2007.
A national intelligence officer gave a top-secret “issue seminar” to NSA staff on the question of “where political action fades into terrorism,” according to a seminar announcement published in June 2004. The announcement suggested that the line between “legitimate political activity” and “activity that is the precursor to, or supportive of, terrorism” is fuzzy. The course used the Vienna-based organization Anti-Imperialist Camp as a case study, describing it as “ostensibly a political organization” but noting that “its many ties to terrorist organizations — and its attempts to collaborate with Muslim extremists — raise questions about where political action fades into terrorism.” No further details were given to substantiate the alleged ties; the group’s website remains online. A spokesperson for the group, Wilhelm Langthaler, told The Intercept that the group was targeted for such accusations for political reasons, including its opposition to the war in Iraq and “our public support for the resistance against occupation which we have compared with the antifascist resistance against German occupation.”
Another seminar announcement said the news media helped stymie U.S. intelligence collection. “A day hasn’t gone by that our adversaries haven’t picked up a newspaper or gone on the Internet to learn something new about how the US intelligence gathering system operates and what its capabilities or limitations are,” the course overview explained. “And in response, a day hasn’t gone by that our adversaries haven’t modified their operations and activities to avoid being detected and collected against by the US intelligence gathering system.”
In an anecdote about signals intelligence during the 1980 Iranian hostage rescue mission, a SIGINT staffer recalled the night of April 24 of that year, when he was told he was monitoring the ongoing “Operation Ricebowl.” In a May 2004 SIDtoday article, the staffer wrote: “We knew the parameters of the Iranian Air Defense system because it was U.S. equipment and installed by U.S. contractors while the Shah of Iran was still in power. We knew exactly where the gaps in coverage were and we exploited it during the rescue attempt.” The author went on to describe his shock the next morning when he saw on TV news at home that the mission had ended with a disastrous helicopter crash.
Top photo: American soldiers from the 1st Cavalry Division 2nd Battalion 7th Cavalry run through a smoke screen as they try to avoid sniper fire during an offensive operation on Aug. 16, 2004, in Najaf, Iraq.
January 10, 2014 *500* Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent *It’s Never to Protect Us From Bad Guys*
No matter which government conducts mass surveillance, they also do it to crush dissent, and then give a false rationale for why they’re doing it.
http://www.globalresearch.ca/500-years-of-history-shows-that-mass-spying-is-always-aimed-at-crushing-dissent/5364462
The space administration has thousands of hours of data and photos no one has ever reviewed, some so old the machines to run it on is not available anymore. Today the effort is just Blackmail, make citizens believe someones listening.
Information paralysis is just an excuse. Yes, it’s possible to get lost in an endless cycle of analysis, trying to find deeper meaning in the daily communications of 7 billion people. But it’s only necessary to find enough targets to keep the American public happy. Just killing one person a day is enough to demonstrate the government is fighting and defeating global terrorism; the identity of the targets doesn’t really matter. Its true that bombing random places on the map would accomplish the same thing, but the coordinates selected by the SID have that patina of authority required to properly impress the general public. In the old days, this was provided by pronouncements from religious leaders. Now we rely on computer printouts to demonstrate our actions have the seal of approval from a higher authority. The SIDs workers are our high priests, charged with selecting the next victim for public sacrifice. This provides the illusion we live in a world governed by a higher authority, and don’t simply live anarchic, meaningless lives.
So I don’t quite understand the reports that SIDs workers suffer from poor morale and are quitting their jobs. Priests have always been charlatans and the SIDs workers need to accept this fact and adjust their expectations accordingly.
Going in and out of Turkey on business in the late 1980s it amused me to see passport control officers noting almost every scrap of information they could find in the passport of everyone entering the country into a computer database. I remarked to my business partner that they couldn’t possibly have the number of staff required to process the information to glean anything meaningful from it. It was all show.
One time, on an internal flight from Ankara to Malatya, I fell into conversation with an American sitting next to me. He went into great detail of how he worked at a listening post on top of a mountain in Eastern Anatolia, eavesdropping on communications in what was then still the Soviet Union. An expert in several Central Asian languages his job was to translate some of those communications into English. He would’ve gone on had I not told him I was a writer hoping to sell stories of my travels to a newspaper. He shut up like a clam for the rest of the flight.
Where is the relevance for all this 12 year old stuff, unless you can tie it to the Trump nominee for NSA who was the head of so. America commandant ?
How come some of the SIDToday articles have the author names redacted, and some don’t? Maybe all should be redacted…releasing their names doesn’t add to the newsworthiness, no?
We don’t redact the names of people who are already publicly associated with NSA. For example, check out this document. You’ll see that the author name, Marilyn Maines, isn’t redacted. If you look in the left sidebar column it says “cite for public name” and the name “Maines, Marilyn” is a link. If you click it, you find this PDF on the Office of the Director of National Intelligence’s website. Inside the PDF it says, “Marilyn Maines and her experts at NSA provided essential expertise on S&T and organized workshops with Toffler Associates to delve more deeply into future trends.”
Many NSA employees advertise that they work for NSA on their LinkedIn profiles, or in their bio on public websites, or are given credit like in this case. We publish these people’s names, and we include a link to where they were already publicly associated with NSA. For people who are not publicly associated with NSA, we redact their names.
What impresses me is this: if we don’t have the proper linguists, it’s a sign that we don’t belong in that part of the world. Since Americans barely speak English, they should retract themselves from overseas high adventures. God, how I wish non-cretins were in charge of this country.
I think you need a new headline writer. This material deserves something far more engaging. This has happened before, and it’s almost as if some truly provocative reporting is being deliberately subdued by a calculatedly dispassionate headline – that, or the person responsible is just not up to the task.
In an age of click-bait, it’s counterproductive to underplay truly charged reporting.
For example –
“Government Stupidity: The Dangerous Foolishness of Information Overload.”
Or:
TOP NSA OFFICIAL CONCERNED THAT AMERICAN OFFICERS RISKED PROSECUTION FOR WAR CRIMES.
(Sub-heading: Information overload led to this and other shocking situations, revealed today with 262 documents from the NSA.)
Or:
“The Rank Idiocy of Information Overload Destroys NSA’s Efficiency.”
all members of the dumb&dumbers association
Great article, thank you. As exposed by the FARC example (leaders banned Comms mentioning hostages), sigint is nothing without tradecraft. Tradecraft like that shown by bombers in Paris who communicated over PlayStation chat while playing private Call of Duty games. I am thoroughly amused at the thought of intelligent analysts having to listen to the profanity laced dirge of 8 year olds trying to virtually kill each other online after that terrible incident. But it’s an indication that we all have to become smarter, not more powerful, to overcome our adversaries AND ourselves. Cheers
This series has had hundreds of documents from 2003 and 2004 – so it glares a bit there’s only seven included from 2005 (so far?), between 1 January and the end of October.
And no matter how head in sand the NSA was pretending to be then, it seems SIDtoday files at some point between 4/2004 and 11/2015 should’ve recognized and begun discussing the publicly revealed American torture programs. They were first revealed to most of the world with the Abu Ghraib prison photos, made public in April of 2004. Then in late 2005 the NSA itself was outed by an insider historian, for distorting facts in the fed-media false flag that’s called the Gulf of Tonkin incident.
https://en.wikipedia.org/wiki/Gulf_of_Tonkin_incident
It seems unlikely these massive national security embarrassments were just ignored during this period, and not met with propaganda, internally.
Thank you both, again! I’m very much interested in the upcoming years of SIDtoday files.
Sorry, that should have been 11/2005 – and not 11/2015. The last doc in this SIDtoday release is dated 10/28/05.
self inflicted wmd warwhore fake news
http://www.express.co.uk/news/world/736223/9-11-tower-Building-7-collapse-fire-conspiracy
ecommcon
specialisation: the science of being more like yourself.
religion: the art of practice of being more like you should be.
government: the operation of protecting and enforcing yourself.
policy: the art of declaring those different than you as the enemy.
SPYING: the practice of gathering information to determine friend or foe.
war: the practice of getting more from your enemey than they get from you.
O/T
Found this interesting perspective in the Clinton email archive. Sounds A LOT LIKE foreshadowing of the 2016 Presidential campaign. This email was from 2010. Seems as if the Trump strategy was not unknown to Clinton as this email is from Sid to Hillary.
It’s funny she and Sid didn’t recognize this and prepare better in 2016.
https://wikileaks.org/clinton-emails/emailid/8374#
“The political story is that the undeserving rich and the undeserving poor (illegal immigrants) have been rewarded while the deserving, hardworking middle class has paid the price. If the Democratic Party is the party of government and government is owned by Wall Street, the Democratic Party ipso facto has become the party of Wall Street. That’s the thematic subtext of John Boehner’s attack on Timothy Geithner. That’s why Glenn Beck calls Obama a fascist and a socialist. This is not FDR’s government; it’s not Bill Clinton’s government. Government has merged with Wall Street in the public mind as a single Leviathan. The Tea Party and the Republicans have stirred and distilled this brew of resentment. “
the more secure powerful and rewarding a govt job is, and the less secure and rewarding a non-gov job is, the more at odds they are. As the gov believes a society cannot exist without it, the more paranoid they will become.
So, the data about a ‘secret and mysterious Russian project’ couldn’t be found no matter how many breeches of Russian security the alphabet soup of American spy agencies could rack up, because it was all publicly available.
Now, just think of the blindness to reality that sort of thinking reveals.
The SIDs people shouldn’t beat themselves up too much. People have long wondered what caused SIDS (Sudden Infant Death Syndrome) and now we know it is due to inadvertent targeting based on faulty signal intelligence data. Identifying the problem is the first step towards finding a solution.
You’re by far my favorite commenter on The Intercept. Just wanted to let you know that.
I hope this doesn’t become another false news story.
Why should it? Its more than 320% true.
Yes the CIA and FBI are inept, this has been reported on since the early 50’s.
The NSA, DIA and EIEIO are just as useless. This is never going to change.
You have a great story on our countries intelligence gathering in the past, in
computer terms ancient history. You would not write about the hardware and
software of 12 years ago, we have moved on. Please tell us what is going on now. We can collect it all, every bite and bit of electronic info….. do we now have the tools to process this info?
These “SIGINT-only strikes” sound like a great way for the U.S. to end up blowing up yet another foreign embassy, hospital, or other off-limits target by accident. If the military has a policy that whoever calls up Osama bin Laden’s number gets droned, somebody is going to walk into the Chinese embassy lobby, pull out their cell phone and dial the number. Hilarity is sure to ensue.
Hilarious is not so prescient…..in a already occurred episode!
“On May 7, 1999, during NATO’s intervention in Yugoslavia, U.S. warplanes accidentally dropped laser-guided bombs on the Chinese embassy in Belgrade. The strike was meant to target a warehouse storing Yugoslav munitions, but the maps given to NATO were out-of-date. Three Chinese citizens were killed and twenty were wounded. Despite apologies from President Bill Clinton, the Chinese blamed America for deliberately bombing the embassy. ”
http://www.huffingtonpost.com/adst/dealing-with-a-pr-disaste_b_9213774.html
This is only one article I chose at random after typing in my browser:
“US Bombing of Chinese Embassy”
“..and had assisted with the hacking of “an important digital network associated” with the leader of Venezuela at the time, referred to erroneously as ‘Victor Chavez.'”
Great job NSA, that’s some fantastic intelligence right there
This story illustrates how the small minds that run and supervise [ha! just joking!] our so-called IC fall into the US-consumer-marketing trap of believing that more is better, that quantity trumps quality. It also demonstrates once again the criminal negligence of the people conducting air strikes in support of various of our undeclared wars. One should NEVER launch a weapon based on signals intelligence, if for no other reason that signals can be spoofed.
Anyone who has been around these kinds of people quickly comes to realize that they are not as portrayed in spy novels, but rather a cross section of society, of average intelligence on the average, and motivated by the same kinds of things that motivate ordinary people working for other government agencies or in the private sector. There are turf wars, petty crimes, disinterest and incompetence there just like everywhere else. The difference between them and us, of course is that with a few keystrokes they can permanently ruin our lives, while we are powerless to stop them.
Americans are being played
If the american economy makes nothing but war, then the currency demands it.
Then thieves run the currency system, and arent prosecuted for their crimes, then you are what?
ecommcon
Thank you Micah and Margot. Some consider these SIDtoday articles “fluff.”
I of course (true to form) have consumed THEM ALL for the many or few discrete elements that further refine informed analysis of the Globalist Military Industrial Surveillance Complex.
I mean shouldn’t “US Intelligence agencies” be an oxymoron? Almost by definition?
Here are better words than “intelligence agencies” to describe much of what they do–“billion dollar boondoggle enterprises”.
Probably why 15 years since 9-11 and the “intelligence agencies” can’t point to a single clear definitive example that their mass warrantless surveillance and data collection activities has prevented even a single terrorist attack that actually had a theoretical, much less practical, ability to be viable.
They seem to be pretty good at creating and taking down poor crazy folk as “terrorists” by feeding them plans and money they couldn’t formulate or obtain on their own skills and initiative.
Trillion dollar F-35s that can’t operate effectively in rain, multi-billion dollar “intelligence” boondoggles, 100s of billions in Pentagon “waste” that is multiples of Russia’s entire military and intelligence budgets . . . year in and year out going on decades.
Seriously, it’s like our military and intelligence elites are trying to destroy America by engaging in an arms and intelligence race against their own paranoia. Shit that’ll probably be America’s epitaph: “America destroyed itself economically fighting the phantoms of its own paranoia.”
I mean if America’s elites and military/intelligence complexes were actually serious about America’s “defense” (meaning its physical territorial integrity) it really doesn’t need much more than its nuclear arsenal. But it isn’t about that. It’s about being a global military and economic hegemon. And that never ends well.
Well as far as phantoms goes, let me rephrase “America destroyed itself economically fighting the phantoms of its own paranoia and the enemies of its own creation as a function of America’s totally unrealistic desires and policies to be a global military and economic hegemon.”
Drowning in information? Please. Ever since Glenn Greenwald joined the Intercept, Snowden’s efforts have been suppressed and astroturfed by the billionaire owner of the Intercept Pierre Omidyar. These current revelations are trivial and only designed to hide the real explosive materials in Snowden’s cache that could embarrass Omidyar’s wealthy friends and his corrupt government connections. I am sure Pierre will be rewarded handsomely for neutering Glenn Greenwald and suppressing Edward Snowden’s life work.
Little man fire big blank.
Classic troll comment. Blame the source for “concealing the real story” for some unstated personal motivations.
Odd that Jamie, so certain of the deceptiveness of others, fails to cite anything remotely resembling evidence. Casting doubt or character assassination against others is a classic disinfo/black ops type of game.
Making blanket smears of others is a psychos head game. Unless “Jamie” here is being paid by someone. Doubtful but possible.