Showing posts with label spies. Show all posts
Showing posts with label spies. Show all posts

Friday, 15 January 2016

We Can See Propaganda by Accepting Nothing and Questioning Everything

Where previously the British Military were allowing 'embedded' journalists to report on their actions this has now changed and a new unit within the army has been formed which has drawn together several previously independent units.  Known since 2015 as the 77th Brigade (which is a hat-tip to Orde Wingate the British officer who formed a 77th Brigade in WWII Burma and who is a much revered Zionist hero who trained for and established brutal and murderous fighting techniques against the indigenous Palestinian resistance www.meforum.org/2458/zionism-of-orde-wingate & www.zionism-israel.com/bio/Charles_Orde_Wingate.htm ), a renaming of the Security Assistance Group, this unit now comprises of :

  • No.1 Column - Planning support focusing on the behavioural analysis of actors, audiences and adversaries
  • No.2 Column - Provides the detail synchronisation and delivery of effect
  • No.3 Column - Provides highly deployable specialists to other parts of the Armed Forces and other Government organisations
  • No.4 Column - Provides professional specialists in Security Capacity Building in Defence
  • No.5 Column - Media Operations and Civil Affairs
  • No.6 Column - Apparently does not exist following just a Brigade traditional (if you want to believe that)
& more recently
  • No.7 Column - The Engineer and Logistics Staff Corps - A powerful and influential specialist Army Reserve unit providing engineering, logistics and communication consultancy to both the MOD and across government agencies.
http://www.army.mod.uk/structure/39492.aspx


This page has gone - can be found via 'Way Back' machine from where the above image was clipped 




So if you want honesty and truth of what is occurring in war zones you can guess this genius club will put their spin onto wherever they can (in not only the mainstream media but also in social media and who knows where in independent media too).

Beyond perhaps the limit of their thinking would be to accept the military have been acting under illegal orders and take immediate steps to put right the wrongs they have perpetrated under the laws of war and natural law.

Note:
Under the former Security Assistance Group, the unit included the following units:[3]

Wednesday, 11 September 2013

The Dark Heart of the Union

I frankly, genuinely, do not doubt the sincerity of some, many, the majority even, of those involved within the European project.

There is bound to be corruption and ineptness when a new order is devised and implemented so quickly. This is typical of all governments, all public offices, all forms of authority. There will be abuse. Cookies will get stolen. It happens.


What people do not understand, including this gaggle of well intention and committed friends, is there is a covert darkness behind the whole enterprise and all are caused to be just playing right into it hands.

Too often the meaning of 'darkness' and of especially 'the occult' are completely misunderstood. This is not unintentional. 'To occult' means simply to hide and this is the clue to understanding what the occult is really about. Clearly it is the same inference with darkness.

Truth, clarity, openness. These are the sort of words one does not readily associate with darkness and the occult.


I think the truth of the EU has been hidden in darkness, occulted, from the minds of all but those who work to seek-out the hidden truth and actual meaning.

This is how states, of all forms, have conducted themselves to control and manipulate the people from time immemorial. And this, the oldest established legacy of prehistoric-mankind to still remain, the state and its utter dependency upon deception to function, needs to be seen for what it is and cast-out, got rid-off, ended for ever.

Tuesday, 10 September 2013

The Origin of the EU - by means of natural selection or, The Preservation of Races in the Struggle for Life

Robert Schuman drew up the Schuman Plan - an initiative to control the production steel and so prevent future arms production.  Published on the 9th of May 1950  this date is now regarded as the birth of the European Union.  Schuman, it is now clear, was funded, supported and encouraged by an OSS (early CIA) operation: The American Committee on United Europe (ACUE), founded in 1948.


At this stage the UK was considered too anti-federalist as it appears to partially remain.  But in terms of being a useful device for the 'The Anglo-American Establishment' to continue to influence and monitor the EU, no better device than the UK has been found.

See: http://en.wikipedia.org/wiki/American_Committee_on_United_Europe

Telegraph: Euro-federalists-financed-by-US-spy-chiefs

See: http://www.telegraph.co.uk/news/worldnews/europe/1356047/Euro-federalists-financed-by-US-spy-chiefs.html

OSS, CIA and European Unity: The American Committee on United Europe
1948-60
Richard J. Aldrich
 University of Nottingham,
See: http://www2.warwick.ac.uk/fac/soc/pais/people/aldrich/publications/oss_cia_united_europe_eec_eu.pdf



Sunday, 8 September 2013

Subcontracting your thinking


If one just blithely accepts that on 9/11 the WTC Twin Towers disintegrated and collapsed into their own footprint, at a without-resistance free-fall speed of gravity just because of aircraft impacts and the resulting fires, and if you do not even understand what 'Building No7' means; you are lost.

If one does not understand the nature of the plethora of glaring questions concerning the events 9/11 and subsequently everything that has 'logically' followed on from this you really do not understand the enormous danger this 'state erosion of privacy' represents to humanity in these modern times.



Tuesday, 16 July 2013

Prism Planet





Anyone to which this flap over Prism is a surprise is, frankly, naive and ill-informed.  The only news to me was being introduced to this new name.

Five Eyes SIGINT or ECHELON has been known to exist for decades and was the feature of a European Parliament report back in 2001 where the threat of industrial espionage is understood as paramount. It is clear that every action on every phone and web based system, across the world, is possible to have been subject to intercept and likely subject of analysis.

 See: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0//EN&language=EN

The technical possibilities remain unknown but it is evident that these systems employ super-computers of gigantic capacity capable of robotic artificial-intelligence analysis of all interactions and associations, including geographic, to seek-out correlations of interest and so identify subjects for closer observation and deeper analysis.

It is also clear these automated systems have the same ability to examine actual communications content, including spoken, on a wide and random scale to further identify and analyse targets of interest.

Whilst it is comforting to think this is only done to protect society from extraordinary threats it is evident even from the synopsis of the EU report, sighted above, that this system is prospectively used for a far wider mode of operation than that: ranging from industrial espionage to the political subjugation of other sovereign states.



But rather than the EU acting to curtail these activities the closing remarks of their 2001 report demonstrates no less than a jealousy and a desire to form the same system or to even integrate and share.

See P192 - 12. The EU's external relations and intelligence gathering

So I would ask the question (but do not anticipate an answer):  How deeply involved is the EU with Prism and indeed does it benefit from the intelligence derived, especially in relation to the EU member state's sovereign governments?

Whilst for the US to risk allowing the intelligence services of each and every EU member state to draw from the intelligence and analysis they derive from their vast network is improbable it is more likely a focused EU intelligence service would be considered a less risky partner to develop.

Once all the tools desirable to a draconian and authoritarian state have been put into place all that remains is for that state to arise, to become evident, when resistance will have be made all-but imposable.

Thursday, 3 May 2012

Cat out of the bag! MI6 Gareth Williams, 'his sister' Cerri Subbe and other players.

Black and white photo-fit photos are the couple who apparently were seen at the apartment in the week or so preceding death.

If you click on the photos they can be viewed as larger images.






Just an observation!

Tuesday, 28 February 2012

Fat little worms sitting in a tin - the time is nigh

In matters of 'hacking'.  However hard it looks like this shower will all eventually come tumbling down, police, press and government, I suspect there remains a can of really big juicy worms that will never be opened. That can is tucked away on a top shelf out of view. The one being kicked down the street, for all to wonder and gloat at, is a decoy.

Just one of these fat worms is hinted at with a story in The Sunday Times: ‘Apps spy on phone messages’ (which you cannot access without a subscription).
But the gist of it below is at this link : http://www.theweek.co.uk/daily-briefing/45566/ten-things-you-need-know-today-sunday-26-feb-2012
3. PHONE APPS SPY ON MESSAGES
Companies, including Facebook, are using smartphone apps to spy on users’ phone messages and gather information about their lives. A Sunday Times investigation also found that some apps can access users’ internet history which is transmitted to third party advertisers, while other apps can remotely control a phone’s camera.

My reading of the publication of this item is to set the ground for if and when it comes out that Screws Indigestible has been doing a lot more than just hacking mobile answer-phones or even computer e-mail. It is to say ‘look folks; everybody’s doing this stuff, its not really so bad and scary. It's the new normal’.
See here an idea of what else is possible when actually 'hacking' mobiles: http://eubrainwashing.blogspot.com/2011/07/more-to-phone-hacking-than-accessing.html

But the effect of such revelation still has the potential to be devastating for NI and the Mudoiks.

The can chock full of juicy worms could well go deeper still. That would be who helped, who allowed powers reserved for the highest levels of police investigation and state security to be usurped for ‘third-party’ surveillance. Surveillance not only of a meaningless celebrity’s toilet habits but such that could compromise national security and those in positions of real power and authority. And yet deeper; is it only the news rooms of NI that benefited from such knowledge and leverage that may have resulted or could this spying network have a darker beneficiary than just pennies on a news-stand.

Trust that such would not occur, just because it should not occur, is misplaced.

Friday, 8 July 2011

More to Phone-hacking than Accessing Voice-mail with Passwords

There is far more to this phone hacking caper than simply accessing voice-mail with passwords.

Cell phones can be activated remotely, loaded with software that takes control of the phone, records text messages, records calls, uses the inbuilt microphones as a listening device/bug, takes all GPS location data, address-book data, call logs, web-history, everything - current and historic - and transmits all, as and when required, to the hijacker when it can then also receive new instructions.


The cellular network transmitter/station local to a target phone can be replaced with a decoy transmitter that relays the signal on to the real network.  The phone must give the transmitter a code to prove who it is to the network but the network does not have to give the phone any code to prove it is the real network.  The phone can be told to transmit without encryption and the false cell transmitter can gain control of the phone in such a way, to download hijack software to take permanent covert control of the phone.

A 'virus' can be sent to the phone to similarly take control of it or the phone can be infected if it is in the possession of the hacker for a very short time.  It is possible to hack a phone via it's wireless connection, blue-tooth or even via a text message.


This may be the reason why the 'authorities' do not want phone intercept intelligence used as evidence in court; because they do not want to plainly admit what can be done and what is being done.  Perhaps this is why the police have been reluctant to further investigations into this matter or perhaps there is another layer between the journalists, the cash, the police and who is doing the actual covert spying on mobile phones.


LINKS

    Sunday, 12 June 2011

    Coroner's Inquest Must Return a Verdict on the Death of Dr David Kelly


    It was Mr Blair who immediately called for an urgent inquiry following the death of Dr David Kelly. Lord Woolf subsequently demanded a veto over the appointment of judges to conduct public inquiries and now the Commons Public Administration Committee call for public comment on inquiries terms of reference.

    It was the findings of this inquiry which ultimately supplanted the process of the coroners inquest. Dr Kelly is the only British citizen who has been a single victim of an incident resulting their sudden death and yet not had a coroners inquest return a verdict.


    The Hutton inquiry was not the appropriate means by which to conclude the cause of Dr Kelly's death. Lord Hutton's remit was to 'urgently' examine the 'circumstances surrounding' the death of Dr Kelly. An inquiry of this type usually relates to an incident - such as a rail disaster - where individual's cause of death is not so much at question but rather to question the cause of the incident itself. The terms of reference given to Lord Hutton are no wider in their scope.

    The coroner, Nicholas Gardiner, should have been allowed to concluded his inquest before the Hutton inquiry commenced. Failing this the coroner should not have subsequently waited for Lord Hutton's findings. His delay in reconvening the coroners inquest anticipated Lord Hutton may drawn a conclusion in his report as to the probable cause of death. Lord Hutton should not have attempted to draw a conclusion as to the cause of death as this was outside of his remit and the "rigours that are normally undertaken at a coroner's inquest simply were not fulfilled" (I quote coroner Dr Michael Powers).




    Nothing obvious was to be gained by so very 'urgently' commencing Lord Hutton's inquiry. Indeed it was inappropriate to have urgently commenced the inquiry without the coroner having first confirmed how Dr Kelly died. From the outset this was a prejudicial conclusion of the Hutton inquiry. An inquest's verdict of suicide and murder has to be established beyond reasonable doubt. If the coroner had returned an open verdict the thrust of the Hutton inquiry would have been wholly different or perhaps not occurred at all.


    There are a great deal of very disconcerting facts surrounding the circumstance and nature of Dr David Kelly's that need further politically independent detailed examination, with evidence taken under oath, by a coroner in an inquest.

    This is because the standard of proof applied at an inquest is usually the civil standard – the coroner and jury must be sure that it was more likely than not (on the balance of probabilities) that the facts have been found proven to support the verdict. There are exceptions: if the verdict of suicide or unlawful killing is reached, it must be proven beyond all reasonable doubt (this is the criminal standard).



    Therefore there remains a reasonable doubt: The finding of suicide should have been proven beyond reasonable doubt but as the evidence given to the Hutton Inquiry was not given under oath a reasonable doubt consequentially must remain.


    Hence I remain focused on this legal aspect. All other matters are far more speculative and open to cheap-shot criticism; at least until such time they have been fully examined in a court under oath.

    Wednesday, 13 April 2011

    If you cannot beat it; join it.


    There will be a new EU agency to add to the list soon: the new EU Intelligence and Internal Security Unit (read 'Committee for State Security' or 'Komitet Gosudarstvennoy Bezopasnosti' (KGB) to give it its proper title). Anticipated by one Olivier Luyckx, who's own experience appears to start and end at his graceful expertise for riding the EU gravy train.

    Since MI6 hold the business end of all the strings attached to Baroness Catherine Ashton's every move (another prime gravy surfer) we can only hope they will truss-up too our new servant proposed to head the unit, Comrade Gilles de Kerchove.

    One way out of this mess is to sink it through total non-cooperation; starting with keeping as much of your money out of the hands of 'the state' by every means possible. Another technique, though less robust, is to take it over from the inside.

    If you cannot beat it; join it. Joint it and then beat it to death from the inside.

    Monday, 6 November 2006

    My fear of ID cards and the underlying database

    My fear of ID cards and the underlying database commences simply from my lack of trust in Tony Blair along with any part of this government. I accept they are not the worse government we could have, I have a powerful imagination and can think off many ways in which our national circumstance can become worse still. One way may be with an oppressive centralised European government, voted into power by a people distant to us through geography and culture, dictating a future clearly detrimental to this island and its people's interests.

    From our recent experience in the hands of the Blair government, leading the nation to a war on a tissue of lies with the unmitigated slaughter and disaster that has ensued as just one clear example, we can learn a salient lesson; we are already near powerless to resist, prevent or correct the wrongful behaviour of our own instruments state.


    We need to know we have the means to protest, to resist and ultimately overthrow our leaders. And they need to know this possibility is an option too. The cornerstone of totalitarian control is put into place with the ID Database. If it's social values are to be realised, it's dangerous nature has to be counterbalanced with liberal legislation offering a viable mechanism to ensure our leaders can never become tyrannical rulers or more likely puppets acting out the bidding from a hidden hand.

    Civil liberties stand as a defence from whatever future holds. To assure an enduringly free society the balance must always be; government is to trust people and not demand legislation that requires the people to trust government.