Transcripts For RT On Contact 20240713 : vimarsana.com

RT On Contact July 13, 2024

Central Intelligence Agency and west germans Intelligence Agency. Krypto agee provided Encryption Services to over 100. 00 governments worldwide for decades unbeknown to those governments the cia had access to the encryption tools and could therefore read high level internal government correspondence from countries including france egypt and as well and many others what this means is that at the highest levels of the Us Government including the white house every assassination every act of ethnic cleansing every disappearance of a dissident every terrorist attack every order to carry out torture whether that took place in guatemala or saudi arabia was known by the United States joining me in the washington studio to discuss these revelations is William Binney a leading intelligence expert who worked at the National Security agency for 30 over 30 years so bill it is a great fascinating story were you aware of it when you know i wasnt actually go but but i mean it makes sense i mean the standard procedure for intelligence agencies to try to get other of course countries to buy into their system well they did an amazing job in the other 123. 00. Countries. And they may even made money on it millions of dollars selling which went right back into the absolutely venture but were talking about some very dirty regimes the shah in iran and the military dictatorships and hunters in latin america India Pakistan even the vatican. Thats how they manage to get manuel noriega. And there is of course. This is what Intelligence Services do and why they were created what they were meant to do but it does make them morally complicit because they know things they know about impending. Actions that will take a life or lives i was talking to before the show i covered the war in bosnia to what extent i dont know about you know what extent potentially did they know about the massacres and trevor needs a 1000 people killed. Talk a little bit about that kind of moral quandary that it that it puts not just the Intelligence Agency itself but by the u. S. Government into well i think its also if you reflect back on world war 2 i think the british did some similar kinds of things when they didnt want to compromise the fact that they were reading the enigma encryption from the from the nazis so so they let things happen that they could about a lot of old british ships yeah i mean they sacrifice to ships thats right and so so they i guess that the idea is to make a value decision is what theyre doing but certainly something of this nature i would think that they could have covered up with all kinds of other kinds of inputs and not really compromised fact that they in fact were reading all these the encrypted messages so although reagan apparently blew the expose the libyan well yes he did that when he thats when he did yes thats true i was a bombing at the mainland discotheque and then he got up in public and said well we read the correspondent thats right from the embassy in berlin and we know gadhafi was lying thats another point if you notice that the countries that didnt buy into this encrypted system that was trying to run the people who do better right right but the problem is you see they were also to an extent compromised by the communications from other embassies from right countries out to their home country right so that they make that point that in fact you may not know what the chinese are saying through their encrypted devices but you know what the iranians are saying to the chinese and what the chinese also say to them they didnt write a report back so that gives them it gives us some insight into what the chinese are think you are planning so. Theres also that i mean one of the things that has this kind of a pall the german intelligence according to this article is that in the United States there really are no friends in the Intelligence Community and. Everyone so for instance during the falklands war i was in buenos aires covering for National Public radio. They could read the argentine devices and which was argentina was not a hostile country to the United States especially under the military junta even though they had disappeared 30000. 00 of your own citizens which they must have known about. And you know but they fed so they could read the argentine devices and were feeding it to the brits who were sailing towards south georgia in the Falkland Islands to retake them yep. I want to talk a little bit about the. Reach and duration of this global surveillance because it was outside of china and russia it was almost everyone. Yeah it started in 1070 i think is the start date for that was from 1970 s. Theyre really recent times so its quite a quite a bit of coverage so how would you compare it to the revelations of snowden did we have greater access at least according to those revelations than we did then i think doubt we do yes because of the internet the because the internet and the reach of the internet and the people who are communicating on the internet yes we have great much greater reach in terms of people access to countries and so on because theyve implanted you know device hardware and software in switches and servers and and that works and computers around the world i mean at one point snowden some of the stowed material said they had over 50000 implants in the world. Network so so you think that from at least what is known released the reach is actually greater yes i do. To what extent do you coming out of the Intelligence Community do you feel there is i mean lets talk about argentina so during the dirty war dissidents trade Union Leaders student activists communists mountain arrows they were all swept up and killed by the time hunt by the military dictatorship. And yet we stood by and did nothing. As they. Carried out one of the most egregious human and later of course or earlier we had seen pinochet in 73. 00 which again they must have known completely about to what extent do you feel theres a responsibility to step in moments like that or is is essentially these people were talking about probably tens of thousands of people are these people just going to be sacrificed for our national selfinterest well i always maintain that intelligence has to it. He stand up for human human really human rights worldwide and and they can do that in ways that will not compromise this sources and methods that theyre using but theyre not theyre not actually trying to do that thats thats the real problem that they have the capacity to do what they have the capability to do it without compromising what their sources are so why arent they doing it i just dont understand that i mean theres a theres an awful duplicity so i mean i covered the wars in Central America whatever the murderous rampages were and el salvador they were dwarfed by real smart white amala and so on the one hand you have through. Intelligence gathering very hard evidence of. Egregious you know Rights Violations and yet this intelligence is sitting on your desk in the oval office or anywhere else u. S. Policy seeks to mask that evidence that it has i mean it often frankly denies it in order to support regimes i mean really would be a good one the shah would be another yes yeah i guess they we we have sold out human rights and around the world not just for you know for regimes that will support us worldwide but also for other regimes that perhaps we we think need to be changed just for the for they see if they can get Something Better they have an opportunity to maybe institute another change for example ukraine is a good one ukraine it we tried to get that regime change to to be a positive one for us and yachts which are god i think was the key statement at that point so its the same thing we attempted coup there just like there was a coup attempt here right here trying to get so you see intelligence agencies doing it in both cases one of the things that came up in the series that was kind of interesting is that they would spend a lot of the workers it was based in switzerland they didnt know and the workers of. Get it out were got rid of pretty quick right there was a woman they talked about kind of figured all those things. But they would send them into these countries to repair these machines to centrally c. I. A. Machine there was a case of somebody one of these poor. Technicians who arrived in iran and the iranians had figured it out yeah well i mean thats thats their whole point they dont they dont consider the implications of it or the. Necessarily the threats that might come to employees that they employ unwittingly who have no idea what what is really the background of the company theyre working for or what their motives are what theyre really doing i mean its just like its just like the congress here doesnt really know what the intelligence agencies are doing even in our country right so you know its no different in this is a problem with intelligence agencies and we need somehow to fix that we had proposed to fix you know to president obama in 2014 but he didnt take it up i mean it was to have. A Technical Group to be able to go around any agency look at any database of any system they had to be able to verify what theyre really doing because right now they cant do that even today lets talk because you Design Systems yes. One of the things they talk about in the in the article is this the evolution of from literally cranks my father as you know in the sea was a cryptographer in world war 2 and they would carry these kind of very easy devices strapped to their legs. Which could be the germans could break down the american but it took them a few hours right this was true a new kind of a tactical thing right so it was by the time they broke it down it was useless because they already moved but there is this evolution within the system. And by the end in a way technology. Outpaces always you know the ability of even this great. Enterprise that theyve set up itself talk about that evolution well its a its a party even and i say they face that problem in the late eightys early ninetys when the digital explosion was starting the they were behind the let me just interrupt because they talk about you know the sixtys even earlier like chronic circuits sure yeah going from vacuum tubes to plate printed circuits so there were any technology is advanced you know allowed greater capabilities and greater greater challenges really to the Intelligence Community so they had to try to keep up with it it was really the digital explosion was really the biggest one that i experience what im going to come back to that ok when we come back well continue our conversation about the cias Encryption Services with William Binney. The Unemployment Rate is not projected to reach 30 percent of america higher than the Great Depression the stock markets up 30 percent from recent lows and the size of the Central Bank Balance sheet has expanded by trillions so the question is which came 1st the expansion of the Central Bank Balance sheet or unemployment what is the cause and what is the fact as we have been saying on the show for 10 years Central Bank Balance sheet expansion causes the unemployment because it causes the deflation that causes the economic duress that creates the unemployment. Thank you because we need you to come the ones we got in here shows no problem why is he didnt know what to do hes trapped in this tiny little wired how much we dont need to create with him he will. Freaking out in t. He will when is freedom anywhere near and thousands of breeding dogs are caged in the into lane conditions on puppy farm i mean 67 years you know theyve been locked up in a cage outside you see no protection from the weather the heat you know the cold air the rain the snow the funder they have no protection. To let you. Get to kids. Across the u. S. Cruel puppy mills are supported by dog shows and extols most of the puppies that are coming from these large Scale Factory farming kind of operations are being sold in stores even joined a Group Businesses are involved like the mom son to there has been a shocking amount of organized opposition to adverts to increase the sands of care for dogs bred in commercial breeding for so many most of that opposition is coming from huge agricultural groups and industries that have nothing to do with jobs dont buy dogs. And were going to fulfill the repeated promises oh probably to the people i promise to be you. Well potts. If you want to. Know. And. Welcome back to on contact we continue our conversation about the cias Encryption Services with bill bennett so before the break we talked about that shift to electronic circuits and then take us from there well from there it basically went from the analog next major shift from analog to digital in my experience thats what thats what i was in i say at the time but you know its the same thing it really was you were looking at the networks back in the dog days and it was simply they shifted to digital so you could really use the same techniques and approaches to solve problems in the Digital World that you did in the analytic were in the analog world but many people thought oh its totally different you know and you have to have new people and young people and they lost that skill to be able to make that transition with the underlying principles of analysis of data period it did what one of the things that interesting is that shift. From in the mid sixtys. With a micrometer actually made it easier. Because and actually if you think about it the the internet makes it a lot easier now too because once you solve the system you solve the for the world because its a standard you know once you get through the standard you you have you have the entire world that your feet you know you can do anything you want to do with it thats why theyre being so successful with this reach through across the internet with the 5 eyes and roughly 9 other countries i think that are participating with them in this bulk acquisition of data around the world it does lend some credibility to the fear about why wait and then oh yeah well my meatball way just to have it all in plain on every deployment you have your you have your own network see thats exactly the 3 that what they want to do is prevent china from having the same thing that we did to the world so thats all. To what extent do you just get overwhelmed with too much data well its either that was the problem even in the 1990 s. Thats why we did the thin Thread Program inside is a huge sign of well i had a good hand at it yeah i did that cath ed loomis did the front half which was acquiring data and i did the back half managing the data but the whole idea was even back then i mean the analysts were making pulls on their data even with the really. Minor collection of the internet that they had at that time it was still overloading the adults i mean they get 1250000 items every day for theyd sit there and theyd start going through and come across something had to report the stop to the report and come back to it that never made it through the entire days data next day a whole new set of data comes back in same thing again so the whole idea was how to how to filter filter and how to look into the data without actually having to look at it to figure out whats important for the analyst to look at and thats exactly what we designed in the 3rd thread and that meant you could have privacy and security at the. In time that was a lie they told from the beginning you had to give up privacy to get security thats been a lie all along and they know that its just that it didnt it didnt give them power over everybody because they didnt have data on everybody and it didnt give them big a budget to build a big empire because it costs a lot of money to do that so you dont load anime now every which you blew the whistle on for which you paid a pretty hefty price but. You know were all monitored yep. And thats all this information is stored in perpetuity yep and is it just stored in perpetuity the way the old stalinist system was so that when you want something on somebody you just pull the file is that yeah thats thats exactly what director mueller the f. B. I. Testified to in the 30 to march of 2011 when he was testifying to the Senate Judiciary committee on how to stop a future fort hood u. S. Person becoming radicalized and killing people and he said well he set up this Technology Database with the with the department of defense where he could with one query go in and get all past emails and all future ones as they come in a person well that tells you hes going into the n. S. A. Database pulling out all the data they all the emails from that person that theyve got stored which goes back to at least 2001 and even before that on certain selected one so so that and then anything that comes in is an automatic routing to them so its a matter of any analyst at the f. B. I. Without oversight by the way going into the n. S. A. Data pulling out all this information on anyone and anyone they want to target well we know from you know the f. B. I. And j. Edgar hoover and that its a very easily leaches over into a way to blackmail and and destroying the lives of dissidents thats what cointelpro was right. And these were any war activists peace activists. Civil rights act was part of their king himself was a victim of this but that we raise this to a whole new level yet at the time that was the same 3 agencies n. S. A. F. B. I. And cia n. S. A. Had a program called minaret that parallel the cointelpro and chaos was a parallel at cia put the same 3 agencies today doing the same thing but on a much larger more more comprehensive scale and one of the things that we know you go back and look

© 2025 Vimarsana