• Quote of the week

    Now I will tell you the answer to my question. It is this. The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power. Not wealth or luxury or long life or happiness: only power, pure power. What pure power means you will understand presently. We are different from all the oligarchies of the past, in that we know what we are doing…. We know that no one ever seizes power with the intention of relinquishing it. Power is not a means, it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power.
    — George Orwell 1984

Russians Spooked by Nukes-Against-Cyber-Attack Policy | Global Research – Centre for Research on Globalization

New U.S. policy on nuclear retaliatory strikes for cyber-attacks is raising concerns, with Russia claiming that it’s already been blamed for a false-flag cyber-attack – namely the election hacking allegations of 2016, explain Ray McGovern and William Binney.

Moscow is showing understandable concern over the lowering of the threshold for employing nuclear weapons to include retaliation for cyber-attacks, a change announced on Feb. 2 in the U.S. Nuclear Posture Review (NPR).

Explaining the shift in U.S. doctrine on first-use, the NPR cites the efforts of potential adversaries “to design and use cyber weapons” and explains the change as a “hedge” against non-nuclear threats. In response, Russia described the move as an “attempt to shift onto others one’s own responsibility” for the deteriorating security situation.

Moscow’s concern goes beyond rhetoric. Cyber-attacks are notoriously difficult to trace to the actual perpetrator and can be pinned easily on others in what we call “false-flag” operations. These can be highly destabilizing – not only in the strategic context, but in the political arena as well.

Russian President Vladimir Putin has good reason to believe he has been the target of a false-flag attack of the political genre. We judged this to be the case a year and a half ago, and said so. Our judgment was fortified last summer – thanks to forensic evidence challenging accusations that the Russians hacked into the Democratic National Committee and provided emails to WikiLeaks. (Curiously, the FBI declined to do forensics, even though the “Russian hack” was being described as an “act of war.”)

Our conclusions were based on work conducted over several months by highly experienced technical specialists, including another former NSA technical director (besides co-author Binney) and experts from outside the circle of intelligence analysts.

On August 9, 2017, investigative reporter Patrick Lawrence summed up our findings in The Nation.

“They have all argued that the hack theory is wrong and that a locally executed leak is the far more likely explanation,” he explained.

As we wrote in an open letter to Barack Obama dated January 17, three days before he left office, the NSA’s programs are fully capable of capturing all electronic transfers of data.

“We strongly suggest that you ask NSA for any evidence it may have indicating that the results of Russian hacking were given to WikiLeaks,” our letter said. “If NSA cannot produce such evidence – and quickly – this would probably mean it does not have any.”

A ‘Dot’ Pointing to a False Flag?

In his article, Lawrence included mention of one key, previously unknown “dot” revealed by WikiLeaks on March 31, 2017. When connected with other dots, it puts a huge dent in the dominant narrative about Russian hacking. Small wonder that the mainstream media immediately applied white-out to the offending dot.

Lawrence, however, let the dot out of the bag, so to speak:

“The list of the CIA’s cyber-tools WikiLeaks began to release in March and labeled Vault 7 includes one called Marble Framework that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to.”

If congressional oversight committees summon the courage to look into “Obfus-Gate” and Marble, they are likely to find this line of inquiry as lucrative as the Steele “dossier.” In fact, they are likely to find the same dramatis personae playing leading roles in both productions.

Two Surprising Visits

Last October CIA Director Mike Pompeo invited one of us (Binney) into his office to discuss Russian hacking. Binney told Pompeo his analysts had lied and that he could prove it.

In retrospect, the Pompeo-Binney meeting appears to have been a shot across the bow of those cyber warriors in the CIA, FBI, and NSA with the means and incentive to adduce “just discovered” evidence of Russian hacking. That Pompeo could promptly invite Binney back to evaluate any such “evidence” would be seen as a strong deterrent to that kind of operation.

Pompeo’s closeness to President Donald Trump is probably why the heads of Russia’s three top intelligence agencies paid Pompeo an unprecedented visit in late January. We think it likely that the proximate cause was the strategic danger Moscow sees in the nuclear-hedge-against-cyber-attack provision of the Nuclear Posture Statement (a draft of which had been leaked a few weeks before).

If so, the discussion presumably focused on enhancing hot-line and other fail-safe arrangements to reduce the possibility of false-flag attacks in the strategic arena — by anyone – given the extremely high stakes.

Putin may have told his intelligence chiefs to pick up on President Donald Trump’s suggestion, after the two met last July, to establish a U.S.-Russian cyber security unit.  That proposal was widely ridiculed at the time. It may make good sense now.

 

Ray McGovern, a CIA analyst for 27 years, was chief of the Soviet Foreign Policy Branch and briefed the President’s Daily Brief one-on-one from 1981-1985.

William Binney worked for NSA for 36 years, retiring in 2001 as the technical director of world military and geopolitical analysis and reporting; he created many of the collection systems still used by NSA.

Source: Russians Spooked by Nukes-Against-Cyber-Attack Policy | Global Research – Centre for Research on Globalization

495total visits,4visits today

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Similar Posts

  • Famous Quotes In History

    By 1850, the House of Rothschild represented more wealth than all the families of Europe. Shortly after he formed the Bank of England, William Patterson lost control of it to Nathan Rothschild and here is how he did it:

    “Nathan Rothschild was an observer on the day the Duke of Wellington defeated Napoleon at Waterloo, Belgium. He knew that with this information he could make a fortune. He later paid a sailor a big fee to take him across the English Channel in bad weather. The news of Napoleon’s defeat would take a while to hit England. When Nathan arrived in London, he began selling securities and bonds in a panic. The other investors were deceived into believing that Napoleon won the war and was eyeing England so they began to sell their securities too. What they were unaware of is that Rothschild’s agents were buying all the securities that were being sold in panic. In one day, the Rothschild fortune grew by one million pounds. They literally bought control of England for a few cents on the dollar. The same way the Rockefeller’s went into Japan after World War 2 and bought everything 10 cents on the dollar. SONY=Standard Oil New York, a Rockefeller Company.”

    — Dr. Ken Matto (History of Lies, Thievery, and Deceit)

     

    “All our law is private law, written by The National Law Institute, Law Professors, and the Bar Association, the Agents of Foreign Banking interests. They have come to this position of writing the law by fraudulently deleting the “Titles of Nobility and Honour” Thirteenth Amendment from the Constitution for the United States, creating an oligarchy of Lawyers and Bankers controlling all three branches of our government. Most of our law comes directly through the Hague or the U.N. Almost all U.N. treaties have been codified into the U.S. codes. That’s where all our educational programs originate. The U.N. controls our education system. The Federal Register Act was created by Pres. Roosevelt in 1935. Title 3 sec. 301 et seq. by Executive Order. He gave himself the power to create federal agencies and appoint a head of the agency. He then re-delegated his authority to make law (statutory regulations) to those agency heads. One big problem there, the president has no constitutional authority to make law. Under the Constitution re-delegation of delegated authority is a felony breach. The president then gave the agencies the authority to tax. We now have government by appointment running this country. This is the shadow government sometimes spoken about, but never referred to as government by appointment. This type of government represents taxation without representation. Perhaps this is why some people believe the Constitution was suspended. It wasn’t suspended, it was buried in bureaucratic red tape.”
    — David M. Dodge

    ” I know that most men, including those at ease with problems of the greatest complexity, can seldom accept even the simplest and most obvious truth if it be such as would oblige them to admit the falsity of conclusions which they have delighted in explaining to colleagues, which they have proudly taught to others, and which they have woven, thread by thread, into the fabric of their lives. ”
    — Leo Tolstoy

     

    Past Famous Quotes | Archive

  • What's New

    What's New
    Milestones: The De-Program Network has surpassed 100,000,000 visits since January 1, 2018 & there is still 9 days left for the month of January with 4112 unique URLs in 4855 links & growing.
    Big SHOUT OUT for all of you who helped make it possible.
    Reformatting of Wisdom & Freedom Little Books I II & III began fall of 2017.
    The De-Program Network Mind Map can be found at the bottom of the Projects tab called theBrain.
    Until we "officially" open: Enter at your own risk.

    Featured Article

    Featured Article

    Periodically there comes along an article that everyone should read. The link below is updated regularly with stellar works that can't be missed.