I have been discussing the total penetration of Israeli top level coded communications, both diplomatic and intelligence. Now, let us turn our attention closer to home where rampant rumor has it, and has been having it for some time now, that even the most secure of secret government sites are being broken into. We know who is breaking into the Israeli sites but the identities of the domestic site-breakers is not known…but guessed at by many. Fifteen year old boys or crazed anti-Bush left-wingers do not figure in the very short list of suspects. Try an alphabet agency, why not?
For some time, B.A.E. Systems has been running a series of classified, intelligence system for various American agencies, such as the CIA. BAE is a British company based at Farnborough, UK, which has extensive worldwide interests, particularly in North America through its subsidiary BAE Systems Inc. BAE was formed on 30th November 1999 with the merger of British Aerospace (BAe) and Marconi Electronic Systems (MES), the defence arm of The General Electric Company (GEC). The run a so-called “Covert Communications” network that is a highly classified blog that acts as a forum for agencies and individual employees to communicate and share information. Since 2005, over a thousand of such blogs have been instituted.
B.A.E. Systems, which runs the CIA’s blog that is hosted on IntelLINK. This has an information technology contract with the C.I.A. The IntelLINK intelligence network links information in the various classified databases of the US intelligence agencies (e.g. FBI, CIA, DEA, NSA, USSS, NRO) to facilitate communication and the sharing of documents and other resources.
There is also the <>ncr.disa.mil<> system. The Defense Information Systems Agency (DISA) was established in Washington, D.C., as the Defense Communications Agency (DCA) with 450 employees on May 12, 1960, by Secretary of Defense Thomas B. Gates. Its mission was to manage the Defense Communications System (DCS), a consolidation of the independent long-haul communications functions of the Army, Navy, and Air Force.
In the 1960s, DCA moved to Arlington, Va., and took on several major organizations. The Air Force Office of Commercial Communications Management (now the Defense Information Technology Contracting Organization), White House Signal Agency (now the White House Communications Agency), and the Department of Defense (DoD) Damage Assessment Center (now the Joint Staff Support Center) all became a part of DCA. DCA also established six regional communications control centers and two area centers for operational control of the DCS.
There are many other supposedly “secure and secret” internet systems that most certainly are not. There appear to be three main groups of hackers who have been having a field day rooting around in our Most Sacred and Secret utterances. One group are civilian experts, looking for something with which to entertain their fellow hackers and computer geeks. Most of them have no idea how much potential damage they are doing. The second group are foreign professional hackers working for their governments who certainly do know how much damage they are doing and the third group consists of our very own domestic intelligence agencies who are spying on their rivals to steal their information and find out as much as they can about said rival’s activities to steal a march on them and, in many cases, make them look like fools. The foreign intelligence people dearly love these people because their activities save them so much time and trouble. Soon enough, I will be forwarding to you material gained from the interdicting of Israeli intelligence and governmental intercepts but will keep the domestic gleanings general and not specific.
For some time, B.A.E. Systems has been running a series of classified, intelligence system for various American agencies, such as the CIA. BAE is a British company based at Farnborough, UK, which has extensive worldwide interests, particularly in North America through its subsidiary BAE Systems Inc. BAE was formed on 30th November 1999 with the merger of British Aerospace (BAe) and Marconi Electronic Systems (MES), the defence arm of The General Electric Company (GEC). The run a so-called “Covert Communications” network that is a highly classified blog that acts as a forum for agencies and individual employees to communicate and share information. Since 2005, over a thousand of such blogs have been instituted.
B.A.E. Systems, which runs the CIA’s blog that is hosted on IntelLINK. This has an information technology contract with the C.I.A. The IntelLINK intelligence network links information in the various classified databases of the US intelligence agencies (e.g. FBI, CIA, DEA, NSA, USSS, NRO) to facilitate communication and the sharing of documents and other resources.
There is also the <>ncr.disa.mil<> system. The Defense Information Systems Agency (DISA) was established in Washington, D.C., as the Defense Communications Agency (DCA) with 450 employees on May 12, 1960, by Secretary of Defense Thomas B. Gates. Its mission was to manage the Defense Communications System (DCS), a consolidation of the independent long-haul communications functions of the Army, Navy, and Air Force.
In the 1960s, DCA moved to Arlington, Va., and took on several major organizations. The Air Force Office of Commercial Communications Management (now the Defense Information Technology Contracting Organization), White House Signal Agency (now the White House Communications Agency), and the Department of Defense (DoD) Damage Assessment Center (now the Joint Staff Support Center) all became a part of DCA. DCA also established six regional communications control centers and two area centers for operational control of the DCS.
There are many other supposedly “secure and secret” internet systems that most certainly are not. There appear to be three main groups of hackers who have been having a field day rooting around in our Most Sacred and Secret utterances. One group are civilian experts, looking for something with which to entertain their fellow hackers and computer geeks. Most of them have no idea how much potential damage they are doing. The second group are foreign professional hackers working for their governments who certainly do know how much damage they are doing and the third group consists of our very own domestic intelligence agencies who are spying on their rivals to steal their information and find out as much as they can about said rival’s activities to steal a march on them and, in many cases, make them look like fools. The foreign intelligence people dearly love these people because their activities save them so much time and trouble. Soon enough, I will be forwarding to you material gained from the interdicting of Israeli intelligence and governmental intercepts but will keep the domestic gleanings general and not specific.
Geen opmerkingen:
Een reactie posten