CIA Mission To Kidnap Edward Snowden

This Gulfstrwam V with the tail number N977GA is part of the Justice Prisoner and Alien Transportation Systems (JPATS), operated by US Marshals. Source: DuncanCampbell.org

A paramilitary team belonging to the CIA is operative in Copenhagen and ready to kidnap Snowden, the popular whistleblower, and bring him in the US with an aircraft on standby in the same city.

The CIA agents are following Snowden's movements, trying to exploit a trip in one or other European country, when there would be an opportunity to kidnap him.

A CIA’s plane  waiting in Copenhagen is a Gulfstream V, registered under the number N977GA.

“On the evening of 24 June 2013, as Snowden arrived in Moscow from Hong Kong intending to fly on to Cuba, an unmarked Gulfstream V business jet – tail number N977GA – took off from a quiet commercial airport 30 miles from Washington DC. Manassas Regional Airport discreetly offers its clients “the personal accommodations and amenities you can’t find at commercial airports”, wrote The Register.

“Early next morning, N977GA was detected heading east over Scotland at the unusually high altitude of 45,000 feet. It had not filed a flight plan, and was flying above the level at which air traffic control reporting is mandatory.”

The same aircraft has been used by the CIA to transport captives to the CIA’s secret prisons which has been created since 9/11

The documents obtained by the Denfri confirmed the circumstance revealing that Danish police and government officers approved the positioning of the CIA plane in Copenhagen for unspecified “state purposes.”

The documents include a government letter from FBI representatives that asks for support of the Norwegian government. requesting the Norwegian authorities to immediately notify US intelligence agencies in the event that Snowden crosses to Norway, Finland, Sweden or Denmark.

The Danish intelligence has sought to preserve total secrecy in relation to the stationing of the CIA aircraft in Copenhagen.

“Denmark’s relationship with the USA would be damaged if the information [content redacted from the documents] becomes public knowledge,” The Denmark’s interior ministry told Denfri.

Security Affairs: http://bit.ly/1ocrwuz

« There Are No Laws About Using Killer Robots
Knowing Cognitive Computing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

SANS CyberStart

SANS CyberStart

SANS CyberStart is a unique and innovative suite of tools and games designed to introduce children and young adults to the field of cyber security.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.