RoccoR
Gold Member
RE: All The News Anti-Israel Posters Will Not Read Or Discuss
⁜→ Natural Citizen, et al,
Yes, there are all kinds of conspiracy theorist on "clandestine" (not covert) collection operations (positive intelligence - not counterintelligence). And (relative to your comment) we can look at just a few of them - the most common ones, and the ones that we can discuss in the open forum. We can, in very broad strokes, divide them up into three groups.
Again, these are categories that are paper thin and thumbnail in their perspective.
The above information is a blend of a couple of approaches that are (interesting to me) that you would mention. They are excellent examples of Gray Source information.
Don't believe everything you hear. Information is planted by the many nefarious activities to achieve some reaction; not necessarily the obvious one.
This week, America has heard much about the Special Councils investigation. What would you say if someone planted the story the one political party started a rumor or planted information for the sole purpose of damaging the reputation and integrity of members of the White House, the family of the President, and to just start various levels of chaos in order to reduce the effectiveness of the President in performing his duties?
TV Shows like NCIS and the FBI (among just a few) demonstrate these very easy access various databases and communications systems or present these elaborate Operations Center that can connect to everything - everywhere, and in a matter of moments track a smartphone. Yeah, and I have the key to the City of New York.
Most Respectfully,
R
⁜→ Natural Citizen, et al,
Yes, there are all kinds of conspiracy theorist on "clandestine" (not covert) collection operations (positive intelligence - not counterintelligence). And (relative to your comment) we can look at just a few of them - the most common ones, and the ones that we can discuss in the open forum. We can, in very broad strokes, divide them up into three groups.
◈ There are those that intentionally plant information (open source) to create rumors to purposely injure US Intelligence capabilities for their own gain.
◈ There are those that are prompted to plant information (open source) to create suspicion on the reliability of otherwise legitimate and valuable intelligence - or - business processes to effect the quality of service.
◈ There are those that are prompted to inject information (open source) to damage the integrity of:
◈ There are those that are prompted to plant information (open source) to create suspicion on the reliability of otherwise legitimate and valuable intelligence - or - business processes to effect the quality of service.
◈ There are those that are prompted to inject information (open source) to damage the integrity of:
• Commercial processes and economic concerns,
• Political personalities or institutions,
• Impact the risk assessment in the use of certain material and equipment.
• Political personalities or institutions,
• Impact the risk assessment in the use of certain material and equipment.
Again, these are categories that are paper thin and thumbnail in their perspective.
(COMMENT)(COMMENT)
...scientific and technical research in many key areas....
Many Americans are bothered that Isreal acts as a foreign agent for the United States intelligence agencies, effectively our federal government, against its citizens to violate their civil liberties via technology. Especially in the mobile device department. .
The above information is a blend of a couple of approaches that are (interesting to me) that you would mention. They are excellent examples of Gray Source information.
First, it casts a shadow over the concepts on the issue of foreign intelligence services (FIS) liaison, intelligence sharing, and overt collection. For those that don't realize it, there are very few countries that don't employ intelligence service. And it is a rare country that does not take advantage of these processes for their own gain. In this case, you are suggesting that the US openly asks Israel (the FIS) to collect through technical means information that is legally obtainable by the Israelis but illegal for the US Intelligence Community (IC) to collect. That would be very foolish indeed. If the US were to engage in such, that would put IC elements at risk through political coercion (operations Blackmail). As foolish as the IC can be at times, they are not this inept. But this is a good operation for others to implant in the media or into Congress as a means to hamper the working assets of the IC.
Second, it feeds the conspiracy theorist community and creates an atmosphere of mistrust between the IC and the citizen there are pledged to protect.
Third, an example of one of the most insane allegations is the one made here: "They've successfully cracked every apple iphone so our passwords are irrelevant." No Intelligence Service (American, Israeli, Chinese, Russian, German, French, etc) is going to confirm or deny that they have broken any telecommunications or cyber protection. If the did, the targets of the electronic, telecommunications, cyber system or telemetry programs would immediately adopt something else. That is a NO gain scenario.
But (fourth) if some FIS wanted a target to discontinue using a particular brand name telecommunications product, they might inject the suspicion or rumor that the security of the device has been compromised.
Second, it feeds the conspiracy theorist community and creates an atmosphere of mistrust between the IC and the citizen there are pledged to protect.
Third, an example of one of the most insane allegations is the one made here: "They've successfully cracked every apple iphone so our passwords are irrelevant." No Intelligence Service (American, Israeli, Chinese, Russian, German, French, etc) is going to confirm or deny that they have broken any telecommunications or cyber protection. If the did, the targets of the electronic, telecommunications, cyber system or telemetry programs would immediately adopt something else. That is a NO gain scenario.
But (fourth) if some FIS wanted a target to discontinue using a particular brand name telecommunications product, they might inject the suspicion or rumor that the security of the device has been compromised.
Don't believe everything you hear. Information is planted by the many nefarious activities to achieve some reaction; not necessarily the obvious one.
This week, America has heard much about the Special Councils investigation. What would you say if someone planted the story the one political party started a rumor or planted information for the sole purpose of damaging the reputation and integrity of members of the White House, the family of the President, and to just start various levels of chaos in order to reduce the effectiveness of the President in performing his duties?
TV Shows like NCIS and the FBI (among just a few) demonstrate these very easy access various databases and communications systems or present these elaborate Operations Center that can connect to everything - everywhere, and in a matter of moments track a smartphone. Yeah, and I have the key to the City of New York.
Most Respectfully,
R