Category: Turkey

  • Is Turkey’s President Dragging His Country to War for Votes?

    Is Turkey’s President Dragging His Country to War for Votes?

    After being accused of joining the campaign against ISIS just to attack the Kurds, Recep Tayyip Erdogan is doubling down—hitting the rebels even harder. But will it win him an election?

    48056281.cachedISTANBUL—Turkish President Recep Tayyip Erdogan is betting that increased pressure on Kurdish rebels in southeast Anatolia will be a vote-getter in snap elections less than two months away.

    But a flare-up of Kurdish rebel attacks that have inflicted the heaviest losses on Turkish soldiers in years has Turks wondering whether Erdogan is dragging the country to war to suit his own political needs.

    So devastating was the shock of the latest attack by rebels from the Kurdistan Workers’ Party (PKK) near the Turkish border with Iraq on Sunday that the government and the military waited more than 24 hours before revealing that 16 soldiers had died. It was the highest death toll for the Turkish army in a single combat event since 2011.

    Fighters from the PKK, a rebel group designated a terrorist organization by Turkey, the United States, and Europe, attacked a military convoy in the town of Daglica and blew up a number of military vehicles with roadside bombs. The well-connected security analyst Metin Gurcan said on Twitter that 500 to 600 rebels attacked the soldiers, while bad weather prevented Turkish attack helicopters from helping the encircled troops. The PKK said at least 31 soldiers were killed.

    In the aftermath, Prime Minister Ahmet Davutoglu held emergency meetings with advisers and Turkey’s chief of general staff, Hulusi Akar, and requested a meeting with opposition leader Kemal Kilicdaroglu, a rare step in Turkey’s polarized political scene. Addressing the public Monday evening, Davutoglu pledged that the mountains of southeastern Anatolia would be “cleansed” of rebels.

    While the government is promising a tough response to the new PKK attack, Kurdish politicians say government security forces are responsible for the killings of six civilians in the southeastern city of Cizre, which the army and police have closed off while they fight the PKK. A delegation of the legal Kurdish party HDP said after a visit to the city that police were stopping ambulances carrying injured and sick people to the hospital. A 10-year-old girl was killed by a police sniper inside her own home, they said.

    Following news of the soldiers’ death in Daglica, Turkish nationalists attacked HDP offices in several cities around the country. Even before the latest flare-up, violent clashes between Turks and Kurds were on the rise. Turkish right-wingers in Istanbul stabbed a 21-year-old Kurd to death after they overheard him speaking Kurdish on his cellphone, the leftist Evrensel newspaper reported Monday.

    With tensions heightened across the country, Erdogan declared in a television interview that things would be different if parliamentary elections in June had produced a majority in the house to change the constitution and introduce a presidential system with him at the helm. Critics say Erdogan sabotaged the search for a new government after the June election, in which his AKP party lost its parliamentary majority. They say Erdogan pushed through the new election, scheduled for Nov. 1, in the hope of winning back the AKP majority and, ultimately, getting the presidential system he wanted.

    One recent survey shows that 56 percent of voters hold Erdogan responsible for the latest flare-up of violence, which began in late July.

    Kilicdaroglu, the opposition leader, has accused Erdogan of stoking tensions in southeast Anatolia to attract nationalist voters to the AKP. “He is responsible for the blood that is being spilled and for terrorism,” Kilicdaroglu said last month, adding of the AKP’s leaders: “They want to stay in power with the help of chaos.”

    The leader of the Kurdish HDP party, Selahattin Demirtas, echoed Kilicdaroglu, saying Erdogan and his ruling party are hoping a new Kurdish conflict will help to win back their parliamentary majority. “The AK Party is dragging the country into a period of conflict, seeking revenge for the loss of its majority in the June election,” Demirtas said.

    Outside Turkey, Eric Edelman, a former U.S. ambassador to Ankara, argues Erdogan is bent on regaining control over parliament in order to push through the presidential system that would give him wide-ranging powers. To that end, Erdogan is portraying the HDP as the political arm of the terrorist PKK and trying to “steal votes” from the right-wing MHP party. Airstrikes against the PKK have reignited “a conflict that had been on the road to resolution,” Edelman wrote in an Op-Ed late last month in The New York Times.

    The question is whether Turks will follow Erdogan. Murat Gezici, a pollster, says his latest survey shows that 56 percent of voters hold Erdogan responsible for the latest flare-up of violence, which began in late July. A suicide attack blamed on the so-called Islamic State that killed more than 30 people on July 20 triggered PKK assassinations of Turkish police officers, with the rebels holding Ankara partly responsible for the ISIS strike. In response, the Turkish government sent warplanes to bomb PKK hideouts in northern Iraq and in Turkey itself, while also bombing some ISIS positions in Syria.

    Turkey’s harsh response angered U.S. officials, who said Erdogan’s government was much less interested in fighting ISIS than taking out the PKK. One senior U.S. official was quoted as saying last month that the campaign against ISIS was only a “hook” for the Turks. “Turkey wanted to move against the PKK, but it needed a hook,” the official told The Wall Street Journal.

    Since then, several dozen soldiers and police officers, and hundreds of PKK fighters, have died, according to Ankara. The renewed fighting shattered a cease-fire between the state and the PKK that had been in force since 2013 and fueled hope for a permanent end to the conflict, which began in 1984. Erdogan says the PKK used the ceasefire to stockpile weapons. The rebels have been attacking security forces in the region on a daily basis and putting up checkpoints.

    So far, there is little evidence that Erdogan’s plan of hitting the PKK to win votes is working. Several polls show the AKP has lost even more ground, while HDP is gaining support. There is “no sign that the latest violent clashes have increased any AKP votes,” Ziya Meral, a London-based Turkey analyst, tweetedMonday.

    Source: Daily Beast

     

  • Turkey Travel Warning

    Turkey Travel Warning

    Amerika Birleşik Devletleri Türkiye’ye seyahat edecek Amerikan vatandaşları ile ilgili güvenlik uyarısı yayınladı.

    tu-map

    The Department of State warns U.S. citizens traveling to or living in Turkey that the U.S. Consulate in Adana has authorized the voluntary departure of family members out of an abundance of caution following the commencement of military operations out of Incirlik Air Base in southern Turkey.  

    On September 2, the Department of State permitted the departure of U.S. government family members from the U.S. Consulate in Adana, Turkey. U.S. citizens seeking to depart southern Turkey are responsible for making their own travel arrangements. There are no plans for charter flights or other U.S. government-sponsored evacuations; however, commercial flights are readily available and airports are functioning normally. The U.S. Consulate in Adana will continue to operate normally and provide consular services to U.S. citizens.

    U.S. government employees continue to be subject to travel restrictions in southeastern Turkey. They must obtain advance approval prior to official or unofficial travel to the provinces of Hatay, Kilis, Gaziantep, Sanliurfa, Sirnak, Diyarbakir, Van, Siirt, Mus, Mardin, Batman, Bingol, Tunceli, Hakkari, Bitlis, and Elazig. The Embassy strongly recommends that U.S. citizens avoid areas in close proximity to the Syrian border.

    U.S. citizens traveling to or residing in Turkey should be alert to the potential for violence. In the recent past, terrorists have conducted attacks on U.S. interests in Turkey, as well as at sites frequented by foreign tourists. We strongly urge U.S. citizens to avoid demonstrations and large gatherings. Even demonstrations intended to be peaceful can turn confrontational and escalate into violence.

    Review your personal security plans, remain aware of your surroundings, including local events, and monitor local news media for updates. Maintain a high level of vigilance, take appropriate steps to enhance your personal security, and follow instructions of local authorities.

  • America’s Dangerous Bargain With Turkey

    America’s Dangerous Bargain With Turkey

    America’s Dangerous Bargain With Turkey

    WASHINGTON — AFTER a year of intense diplomatic negotiations, the Turkish government is now permitting the United States to use Turkey’s Incirlik Air Base, which will allow American aircraft to fly missions in Syria and Iraq with greater operational effectiveness and economic efficiency.

    The price of this agreement, however, may well be too high in the long run, both for the success of America’s anti-Islamic State campaign and for the stability of Turkey.

    That’s because the Turkish government’s recent change of heart and its sudden willingness to allow American access to the Incirlik base was driven by domestic political considerations, rather than a fundamental rethinking of its Syria strategy.

    Shortly after granting access to the base, Turkey’s president, Recep Tayyip Erdogan, launched a wave of airstrikes on Kurdish targets, reigniting a conflict that had been on the road to resolution. To make matters worse, Turkey has struck hard at Syrian Kurds who have, until now, been America’s most reliable ally in fighting the Islamic State, often called ISIS, in northern Syria.

    Photo

    27edelmanWeb master315

    A demonstration against the Kurdistan Workers’ Party on August 16 in Istanbul. Credit Ozan Kose/Agence France-Presse — Getty Images

    American and Turkish policies toward Syria were always rooted in different visions of what Syria would look like if the regime of President Bashar al-Assad fell.

    Washington’s policy has been inconsistent and vague, but it always envisioned a post-Assad Syria that would be pluralistic and guarantee minority rights. Turkey recognized early on that Mr. Assad’s brutal policies would lead to radicalization, but the Turkish policy of seeking a Sunni-dominated Syria, governed by forces rooted in the Muslim Brotherhood, has not helped matters.

    Mr. Erdogan’s preference for Sunni dominance explains Turkey’s lax border policies over the past four years, as well as its tacit support for the extremist Sunni group the Nusra Front, and its failure to take the Islamic State seriously as a threat until the fall of Mosul and the beheadings of Western hostages. Even then, Turkey was reluctant to change course and fully back the American goal of degrading and defeating the militant group.

    Mr. Erdogan’s overriding objective has instead been to achieve a parliamentary supermajority that will grant him an executive presidency and solidify what is rapidly becoming a one-party state. Since his party lost its governing majority in the June elections, dashing his desires, he has focused on forcing early elections — now set for November — to regain control of Parliament.

    To do so, Mr. Erdogan hopes to tar the pro-Kurdish People’s Democratic Party as a terrorist front and steal votes from the Nationalist Movement Party. He has used the current crisis as a smoke screen behind which to launch an air war against militants from the Kurdistan Workers’ Party, or P.K.K., in Iraq and artillery strikes on the Democratic Union Party, or P.Y.D., in Syria. He has also unleashed a new wave of repression aimed at Kurds in Turkey, which risks plunging the country into civil war.

    This strategy might help Mr. Erdogan win an election, but it is severely undermining the fight against the Islamic State. By disrupting logistics and communications links between the P.K.K. in Iraq and the P.Y.D. in Syria, Turkey is weakening the most effective ground force fighting the Islamic State in Syria: the Kurds.

     

    We would do well to remember that it was P.Y.D. forces, with logistical support and reinforcement from the P.K.K., that liberated the city of Kobani last year and recently retook Tal Abyad, cutting off a key route for infiltration of arms and foreign fighters for the Islamic State.

    America’s agreement with Turkey might yield more effective airstrikes, but that will come at the cost of losing the valuable real-time intelligence provided by Kurdish forces that is so crucial for targeting purposes.

    In the long run, undercutting the Kurds will be extremely damaging to the anti-Islamic State effort since allowing Turkey to create a no-go zone for Kurdish forces will not carve out territory for moderate fighters; instead, it risks creating a safe haven for Islamist groups like the Nusra Front and Ahrar al-Sham, whose growing strength will exacerbate the toxic sectarianism and ethnic violence that has plagued Syria for the past four years.

    Secretary of Defense Ashton B. Carter’s recent declaration that “we do want Turkey to do more in the fight” against the Islamic State prompted a pledge by Turkey’s foreign minister to step up its airstrikes against the group. But this raises the question of whether or not Turkey will call off its war against the Kurds.

    If not, America’s deal with Turkey will prove to be a Faustian bargain. Short-term operational convenience is not worth the long-term danger of destabilizing Turkey and demoralizing the Kurdish forces that have carried the bulk of the burden in fighting militants.

    An ally racked by violence and insurgency simply can’t play the role that the United States needs a secular, democratic Turkey to play in the turbulent Middle East.

    Fortunately, America does have leverage. Turkish officials desperately crave the approval of their counterparts in Washington; the United States must not grant it.

    Instead, the Obama administration should restrict Turkey’s access to senior-level meetings, reduce intelligence cooperation and withhold American support for Turkey in international financial institutions in the likely event that Mr. Erdogan’s policies precipitate an economic crisis.

    Getting Turkish leaders to change course will be extremely difficult, but it is imperative to pressure them if Turkey is to avoid being sucked into the vortex created by a failed Syria policy and Mr. Erdogan’s dogged quest for absolute political power.

  • MK ULTRA PROJECT : 10 Modern Methods of Mind Control

    MK ULTRA PROJECT : 10 Modern Methods of Mind Control

    The more one researches mind control, the more one will come to the conclusion that there is a coordinated script that has been in place for a very long time with the goal to turn the human race into non-thinking automatons. For as long as man has pursued power over the masses, mind control has been orchestrated by those who study human behavior in order to bend large populations to the will of a small “elite” group. Today, we have entered a perilous phase where mind control has taken on a physical, scientific dimension that threatens to become a permanent state if we do not become aware of the tools at the disposal of the technocratic dictatorship unfolding on a worldwide scale.

    Modern mind control is both technological and psychological. Tests show that simply by exposing the methods of mind control, the effects can be reduced or eliminated, at least for mind control advertising and propaganda. More difficult to counter are the physical intrusions, which the military-industrial complex continues to develop and improve upon.

    1. Education – This is the most obvious, yet still remains the most insidious. It has always been a would-be dictator’s ultimate fantasy to “educate” naturally impressionable children, thus it has been a central component to Communist and Fascist tyrannies throughout history. No one has been more instrumental in exposing the agenda of modern education than Charlotte Iserbyt — one can begin research into this area by downloading a free PDF of her book, The Deliberate Dumbing Down of America, which lays bare the role of Globalist foundations in shaping a future intended to produce servile drones lorded over by a fully educated, aware elite class.

    2. Advertising and Propaganda – Edward Bernays has been cited as the inventor of the consumerist culture that was designed primarily to target people’s self-image (or lack thereof) in order to turn a want into a need. This was initially envisioned for products such as cigarettes, for example. However, Bernays also noted in his 1928 book, Propaganda, that “propaganda is the executive arm of the invisible government.” This can be seen most clearly in the modern police state and the growing citizen snitch culture, wrapped up in the pseudo-patriotic War on Terror. The increasing consolidation of media has enabled the entire corporate structure to merge with government, which now utilizes the concept of propaganda placement. Media; print, movies, television, and cable news can now work seamlessly to integrate an overall message which seems to have the ring of truth because it comes from so many sources, simultaneously. When one becomes attuned to identifying the main “message,” one will see this imprinting everywhere. And this is not even to mention subliminal messaging.

    3. Predictive Programming – Many still deny that predictive programming is real. I would invite anyone to examine the range of documentation put together by Alan Watt and come to any other conclusion. Predictive programming has its origins in predominately elitist Hollywood, where the big screen can offer a big vision of where society is headed. Just look back at the books and movies which you thought were far-fetched, or “science fiction” and take a close look around at society today. For a detailed breakdown of specific examples, Vigilant Citizen is a great resource that will probably make you look at “entertainment” in a completely different light.

    4. Sports, Politics, Religion – Some might take offense at seeing religion, or even politics, put alongside sports as a method of mind control. The central theme is the same throughout: divide and conquer. The techniques are quite simple: short circuit the natural tendency of people to cooperate for their survival, and teach them to form teams bent on domination and winning. Sports has always had a role as a key distraction that corrals tribal tendencies into a non-important event, which in modern America has reached ridiculous proportions where protests will break out over a sport celebrity leaving their city, but essential human issues such as liberty are giggled away as inconsequential. Political discourse is strictly in a left-right paradigm of easily controlled opposition, while religion is the backdrop of nearly every war throughout history.

    5. Food, Water, and Air – Additives, toxins, and other food poisons literally alter brain chemistry to create docility and apathy. Fluoride in drinking water has been proven to lower IQ; Aspartame and MSG are excitotoxins which excite brain cells until they die; and easy access to the fast food that contains these poisons generally has created a population that lacks focus and motivation for any type of active lifestyle.

    Most of the modern world is perfectly groomed for passive receptiveness — and acceptance — of the dictatorial elite. And if you choose to diligently watch your diet, they are fully prepared to spray the population from the above.

    6. Drugs – This can be any addictive substance, but the mission of mind controllers is to be sure you are addicted to something. One major arm of the modern mind control agenda is psychiatry, which aims to define all people by their disorders, as opposed to their human potential. This was foreshadowed in books such as Brave New World. Today, it has been taken to even further extremes as a medical tyranny has taken hold where nearly everyone has some sort of disorder — particularly those who question authority. The use of nerve drugs in the military has led to record numbers of suicides. Worst of all, the modern drug state now has over 25% of U.S. children on mind-numbing medication.

    7. Military testing – The military has a long history as the testing ground for mind control. The military mind is perhaps the most malleable, as those who pursue life in the military generally resonate to the structures of hierarchy, control, and the need for unchallenged obedience to a mission. For the increasing number of military personal questioning their indoctrination, a recent story highlighted DARPA’s plans for transcranial mind control helmets that will keep them focused.

    8. Electromagnetic spectrum – An electromagnetic soup envelops us all, charged by modern devices of convenience which have been shown to have a direct impact on brain function. In a tacit admission of what is possible, one researcher has been working with a “god helmet” to induce visions by altering the electromagnetic field of the brain. Our modern soup has us passively bathed by potentially mind-altering waves, while a wide range of possibilities such as cell phone towers is now available to the would-be mind controller for more direct intervention.

    9. Television, Computer, and “flicker rate”– It’s bad enough that what is “programmed” on your TV (accessed via remote “control”) is engineered; it is all made easier by literally lulling you to sleep, making it a psycho-social weapon. Flicker rate tests show that alpha brain waves are altered, producing a type of hypnosis — which doesn’t portend well for the latest revelation that lights can transmit coded Internet data by “flickering faster than the eye can see.” The computer’s flicker rate is less, but through video games, social networks, and a basic structure which overloads the brain with information, the rapid pace of modern communication induces an ADHD state. A study of video games revealed that extended play can result in lower blood flow to the brain, sapping emotional control. Furthermore, role-playing games of lifelike war and police state scenarios serve to desensitize a connection to reality. One look at the WikiLeaks video Collateral Murder should be familiar to anyone who has seen a game like Call of Duty.

    10. Nanobots – From science fiction horror, directly to the modern brain; the nanobots are on the way. Direct brain modification already has been packaged as “neuroengineering.” A Wired article from early 2009 highlighted that direct brain manipulation via fiber optics is a bit messy, but once installed “it could make someone happy with the press of a button.” Nanobots take the process to an automated level, rewiring the brain molecule by molecule. Worse, these mini droids can self-replicate, forcing one to wonder how this genie would ever get back in the bottle once unleashed. Expected date of arrival? Early 2020s.

    A concerted effort is underway to manage and predict human behavior so that the social scientists and the dictatorial elite can control the masses and protect themselves from the fallout of a fully awake free humanity. Only by waking up to their attempts to put us to sleep do we stand a chance of preserving our free will.

    Source

  • MK ULTRA PROJECT : The NSA – Behind The Curtain “Nano-Brain-Implant”

    MK ULTRA PROJECT : The NSA – Behind The Curtain “Nano-Brain-Implant”

    The NSA – Behind The Curtain

    Mon Jan 16, 2012 7:54 PM EST

    As promised, we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

    What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

    We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

    I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

    Mr Computer

    The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

    The NSA is built around a super-computer bound Artificial Intelligence to Nano- Brain-Implant known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

    Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

    Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

    Mr Computer’s capabilities and human-like reasoning cannot be understated.

    Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

    Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

    The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

    Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

    Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

    The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

    nsa2bhq2bthe2bamerican2bministry2bof2btruth2bfrom2b19842btopsecretwriters2bcom

    Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

    It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

    As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

    Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

    The Pipes Are Calling

    First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

    We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

    The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

    This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

    We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

    The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

    Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

    Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

    These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

    So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

    Say hello to Mr Computer…

    In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

    The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

    Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

    A mixture of ground, air and satellite-based networks are used to deliver this capability.

    Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

    With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

    In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

    Input, Input, Input

    Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

    The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

    Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

    Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

    Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

    We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

    With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

    Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

    If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

    Ignore any suggestion that this too much data. The truth is that all the communications happening on the planet right now can be monitored in near real-time.

    As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

    As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

    Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

    Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

    These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

    Hardware

    This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.

    My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems. With their base costs, they could be running several hundred easily.

    The Thinking Machine

    Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

    The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

    A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

    If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

    Eidolon TLP – Mr Computer in incognito

    Conclusion

    The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others,always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak. At some point, it could be your turn.

    What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. Never trust a government, even your own, implicitly. Nations change, opinions change and people change. It just takes the right catalyst for it to happen.

    In most cases, you will find the seeds were there, you just chose to ignore them.

  • “The Armenian Insurrection and the Great War” by Dr. Pat Walsh

    “The Armenian Insurrection and the Great War” by Dr. Pat Walsh

    BOOK REVIEW:

    “The Armenian Insurrection and the Great War” by Dr. Pat Walsh and Dr. Garegin Pastermadjian “Armen Garo” (A Cautionary Tale of Betrayal) ISBN 978-1-8722078-23-6 “Belfast Historical & Educational Society” 215 pages.
    INTRODUCTION: For those who undertake wide ranging, below the surface and cross referenced research on the “genocide fanfare”, which has been popular only in the last fifty years, there are some logical questions. These are generally never asked or answered when debating a hundred or hundred and fifty years’ old historical events which are likely to have been forgotten long ago. The very important reality is that the genocide allegations relating to over a century old events do not stand on any reliable documentary evidence, i.e. official reports, past memorandums or correspondence and alike… They are usually based on grand-mother stories and personal hearsay, even than not on dependable true eyewitness reports.
    Generally they are relied on the names of a few scholars who do not read widely or who would not refer to any document that will not suit their objective. A very recent example amongst the academic papers is <“Final Report – September 2014” prepared by “Armenian Genocide Reparations Study Group,” who express their thanks for the grant of the Armenian Revolutionary Federation. The study was chaired by Henry C. Theriault; the members were Alfred de Zayas, Jermaine McCalpin and Ara Papian. The name of the report is “Resolution with Justice –Reparations for the Armenian Genocide.” Complete report can be viewed at: !>. Thesewriters seldom refer to books or documents of the relevant period, instead they rely on “persons who acknowledge generous grants”. So far we know that all documents presented as historical evidence on this claim have been proved to be false, doctored or fabricated!

    There are several names of “Armenian Heroes” who were the leaders of various revolutionary groups who committed murders, treacheries etc. They wrote books in their hay days, boasting about their bravery, relating to local revolutions, dedication to invading armies (Russian, French, British) and their extermination of the members of Muslim majority of the mother land. Such books or documents have been disappearing from main libraries and never brought to the attention or knowledge of the brainwashed diaspora. It should be noted that quite a number of Armenian dignitaries did not endorse the “revolutionary aims or tactics and tried to warn their people”, but they were disregarded or eliminated.
    Dr. Pat Walsh is actually a historian who studied the Irish – British relations in the past two hundred years and discussed the Imperialist mistreatments of Catholic Irish people by the Protestant British. These mistreatments had brought many calamities on the Irish farmers and desolation to Irish people. After the 1840s, nearly one million Irish people immigrated to USA and in 1900s, the “Irish born” Americans constituted about 43% of all immigrants who were accepted into USA. Dr. Walsh was even more surprised to learn that there were great donations as money and five ships of grain by another country to Ireland during those bad days of starvations, while the British made no exceptions on the “potato they were taking as tax”. For other books by Dr. Walsh please refer to <http://drpatwalsh.com/about/publications/>

    Armenian sources never mention the name of Hovannes Katchaznouni, the Prime Minister of the Dashnakist Armenian Republic (May 30, 1918 to mid-August 1919) who made a confession at the 1923 Bucharest Congress of their Party. He detailed how they had been misguided by promises, over estimation of their strength and in short how and why they themselves caused the destruction of the Armenian People. This memorandum is written with political finesse, not mentioning much of their large crimes on Muslims. , even this minimum frankness was not tolerated by the Dashnakists who are now in control of ANCA, diaspora and all the major movements for a century!

    Garekin Pastermadjian (the Brave Armen) had the most remarkable life full of braveries for the Armenian Revolutionaries and their own people. He was born in 1868 in Georgia, but had his education in Istanbul and in 1896 he was one of the top leaders who raided the Ottoman Bank and took 160 persons as hostage for 48 hours (about 50 persons were killed by bombs and gun fire during the siege). The criminals were let free to go to France and Pastermadjian became a Doctor of Chemistry in Switzerland. He returned to Tbilisi, setting his own business. However, in the 1908 and 1913 Ottoman Parliamentary elections he was one of the 12 Armenians in the Parliament, representing Erzurum. He was offered a post in the cabinet which he turned down. While he was a Member of Parliament, he had organized a group of about 2000 cavalry Revolutionaries. Before WW-1 had started – for the Ottomans on November 2, 1915 – Pastermadjian and his forces were already on the Russian side of the border, offering their “guiding and reconnaissance services” to the Russian Army.

    Garekin Pastermadjian and his two books depict him as ONE OF THE MOST FAMOUS Armenian Revolutionary Leaders. In my books I tried to give some examples of his deeds which I had included in my :<http://armenians-1915.blogspot.com/2008/10/2610-genocide-lies-need-no-archives.html> paper in 2008 which hardly caught any outside attention.

    I always felt somewhat unable of outlining the importance of this great Armenian Leader who was later made an ambassador to USA, playing an important role “in having USA recognize the young Armenian Republic”. He worked most actively and supported his claims with two excellent books in 1918, printed in Boston. After the surrender of the Ottoman Empire (Oct.30, 1918) he was one of the leaders to set up the “Nemesis Revenge Organization”. His endless efforts for the Armenian cause at the Paris and Lausanne Peace Conferences had no result and he died in Switzerland in 1923 by a heart attack in frustration!

    Dr. Walsh has made a very unusual and clever move when writing this book. He took Garegin Pastermadjian as co-author of his book. The contents and explanations given in detail leave no doubt about the treason of Armenian Revolutionaries and that even the Armenian Members of Ottoman Parliament were revolutionaries themselves in the service of the enemies and plotted against all the institutions of their home country. This example itself is sufficient to prove that the Ottoman Authorities had very good reasons and justifications to arrest about 235 Armenian dignitaries as late as April 24, 1915 and intern them in houses and prisons in Ankara – Cankiri region. Only this could enable them to stopping their contacts with Armenian revolutionaries, the supporting Patriarchate and the British-French Anzac forces who were to lend the following night.

    Dr. Walsh, instead of using one of the books of Pastermadjian; he copies and quotes verbatim the “Memorandum of Armenia and Her Claims to Freedom and National Independence” submitted by Senator Henry Cabot Lodge (Republican). He was always at odds with everything President Wilson (Democrat) was implementing, including his “fourteen points”, wish to organize League of Nations and anything that would not suit the American Independence. The Memorandum is dated December 15 or 23rd of 1919, and printed by the “Washington Government Printing Office, 1919.” Hence it is a document as strong and colossal as the Washington Monument. Why Turkish sources never used this “monumental document” has no explanation or excuse, other than exposing the “huge black holes of knowledge of Turkish scholars, writers and politicians” on this subject for a century.
    The Memorandum details the Turkish Armenian Relations and causes of disagreement etc. Pastermadjian claims that out of 18.000.000 Ottoman population 2.100.000 were Armenians. This has no supporting evidence. We have a report prepared directly by the Joint French-Armenian Land Distribution Committee dated March 1, 1914, giving the total population as 1.280.000, confirmed by other official records which cite even lower figures. In 1912 the Armenian Patriarchate had declared the census as 1.425.000 Armenians. How this number was increased to 2.100.000 (despite claimed massacres, epidemics, starvation) should be explained by Armenians. More interestingly, there is in existence a clear map of the Armenian territorial claims from Eastern Black Sea coast cities down to the Mediterranean, including Alexandretta and Cilicia. Looking at today’s Turkey, one can easily see that Armenians claimed 40% of today’s Anatolia, “freed of all non-Christian elements” (in fact 80% of the settled people). We widely hear today that Turks killed 1.5 million Armenians during the relocation period (150 days which will average 10.000 killed every day, buried in stadium size graves, dug by some 5000 workers every day). No such graves were ever found or documented, nor any massacres eye witnessed by any neutral persons. Again the scholars and others claiming that 1.5 million were killed (out of 1.3 million), must explain which Armenians were to be settled in this huge area when they supposedly had already been annihilated. The NONSENSE of this Genocide palaver is not much different than hiding an elephant in a room.
    Year 1919 has several important dates for the Armenian agenda. Some of these can be pinpointed chronologically as below:
    a- Armenian Republic founded on 28.5.1918 under Ottoman Protection, with special treats but Armenian leaders such as Keri, Dro, Antranig refute the accord and continue their cleansings of Muslims in their regions.
    b- The Ottoman Empire surrenders on 30.10.1918; next month on 30.11.1918 Armenia revokes the treaties, grabs Ardahan, Kars provinces with the permission of the British in Persia.
    c- Pastermadjian was sent as Ambassador to USA with letter of the Patriarch in July 1918 to search for American aid and recognition; he edits two books in October 1918 in Boston.
    d- Late December 1918, Pastermadjian submits the Armenian claims to the US Senate through Mr. Lodge, which are fully quoted in the first part of the book.
    e- On Feb.26, 1919, the Armenian Delegation submits a Memorandum to Paris Peace Conference with similar requests signed by Aharonian and Boghos Nubar.
    f- Antranig comes late for the Paris Conference, continues to London; on June 19, 1919 a large conference is arranged with high praises of all British dignitaries who had provoked Armenians!
    g- US send Captain Emory Niles and Arthur Sutherland in July 1919 to make a survey in the war struck zones (U.S. National Archives Ref. 184.021/175) Constantinople, Aug. 16, 1919, gives details on Armenian atrocities and damages.
    h- General Harbord and a mission of about 40 people were ordered by the President on August 1, 1919 to make a survey in Anatolia and Armenia and prepare a report to support “American mandate on Armenia.” The Mission travels for one month in the region, meets Mustafa Kemal, travels to Batum, Armenia and returns to Istanbul preparing a very comprehensive report in late October 1919, paradoxical to the expectations of the President and Senate, and giving details of such a burden on USA for no reason or advantage whatsoever.
    i- Senator Lodge presents the Claims of Armenia to the US Senate in the second half of December 1919 which contradicts the findings and advises of General Harbord.
    j- General Harbord’s Report is presented by Mr. Lodge as late as mid April 1920 to the US Senate.
    Among the many “documented facts” there are three points Pastermadjian admits and which go unnoticed. The first point is that “250.000 Turkish Armenians were sent by Russians to Siberia”. We know from several sources that at least 250.000 – 300.000 Turkish Armenians had immigrated to Russia with the Russian Army. The U.S. Near East Relief Report gives this number as 500.000. This immigration is confirmed by Russian records as well. When the Dashnakist Armenian Republic was founded (under Turkish protection on May 28, 1918) their population was 885.000 (instead of 500.000 Russian Armenians) which shows that about 385.000 (or less) Armenians were those who took shelter in Russia. After 30 months in December 1920 this population had dropped to 690.000, evidencing that 195.000 Armenians (mostly from Turkey) died in Armenia under their own government. This is never mentioned but the Soviet document by Armenian Historian stands open.
    The second important point is that when Russians occupied Eastern Anatolia and Turkish Armenians who had taken refuge in Russia, the Russians permitted only about 25.000 to return. Russians did not trust Armenians and they were to settle Cossacks in the evacuated villages (to control Armenians).
    The third important detail is that when Armenians left, they had left behind in bundles and boxes of their valuable items, duly labeled and evidenced by receipts because “they were to return when the war was won by the Ottomans”. All these boxes and bundles were stored inside an Armenian Church or cathedral under lock and guard and no one was permitted to enter. However, when the Russian Commander General Kaledine enters the city and hears about these stored goods, he enters the Cathedral and opens the boxes and bundles. He gets a few carts loaded for him. After him, other officers share what was left and this became a “looting order” in the absence of museums of today.
    After this self explanatory report of the “Armenian Ambassador to USA, Garekin Pastermadjian”, Dr. Walsh starts his “forensic style studies and explanations”. Let us not forget that several important points of this Pastermadjian’s Memorandum in the US Senate bears great similarity to the “Memorandum of Feb. 26, 1919, presented by the Armenian Delegation to the Paris Peace Conference”, co-signed by A. Aharonian and Boghos Nubar, representing the Armenian Republic.
    These documents are never referred to by “G” scholars or defenders! They have never seen the League of Nations Official Gazette of Sept.21, 1929 in which this Organization affirms that 200.000 Armenians died in fights against Turks, in the service of the enemies. The elephant is under palavers.
    Dr. Walsh starts his section of study, “A Cautionary Tale of Betrayal” and provides an excellent analysis not only of the “end result of Armenian victimization claims” but also going back to the earlier revolutions, the effect of American Missionaries, the very strong British destabilization and the concessions they had to make to Russia when sharing the Ottoman Empire, “because Britain needed land forces which they did not have”. They controlled all seas and oceans, but needed man power so they finally promised Istanbul and Bosporus to Russia, while they were going to keep the Dardanelles Straight for themselves. The information and references Dr. Walsh has included “in this forensic study of historical facts” are all new and coherent.
    I do not know which persons or authorities will thank Dr. Walsh for this concise, double or triple cross checked excellent study. Dr. Walsh surprised me with another act by dedicating this valuable study to my name. This may be because of my age or my highlighting this very important Armenian hero in some of my writings. Thank you Dr. Walsh for your monumental contribution to the “G” history!
    Sukru Server AYA