le 08062015 C E

Hi all

I see gentlemen, ladies of the German people, and the people Americans, and we, too, french, Spanish, Ukrainian, the fake ass of the G 7 tries to blame Putin, because, there were abuses in Ukraine or saying, that is why he was not invited, but the fact that they have had no 10 not, 20 Ukrainian soldiers, who have rendered but 90 soldiers, why, because it is FACISTES to the Government of acorns, Ukrainian, they passed a law, which is punishable by the death penalty (shot) for desertion, it’s not like this, they will require soldiers Ukrainian fighting cnotre their close neighbour, is not PUTIN, they will have told them to go , is that anyway, the guys is rendaitent, because he had the impression of being more to listen to the other side, and they had good reason, one fights for his nation, and, because the person who is the head is capable, and to prove that she was worthy of confidence, Putin, is what it is, but I saw a video , and it didn’t appear to be mounting, one sees Putin, sitting at the end of table and the boss of a sugar factory, I believe, it wasn’t, my intention to advertise, for that whatsoever, but, when I v u on this video on Putin require the patron of this factory to sign, just by looking at and holding pen While fixing it in the eyes,(et l’autre,qui baissait la tète,parce qu’il avait l’air de savoir,qu’il avait merdé) he signed the agreement, had already formulated, this is not Holland, which would, this, yet it is a guy like that, that should have been with of Mittal, and the good for nothing as Maurice TAYLOR (TITAN) P-T-N, him, he goes to get fucked! , Holland, that crosses much of patrons in these FASCIST Masonic meetings, when this n is not sellières, or, silly bet, it is, sure that if asked me to choose between Putin, MERKEL, OBAMA, HOLLAND, it is safe that I would vote for Putin, and not these charlots, which, we bite our frics, who had put full fffffffouilles, and, who only think about get rich on our back as these paedophile Masons francs NAZIS, returned in, them, that the other OBAMA goes back on his chariot of Pharaoh, the closed, that she withdraws the headset or the phone, which is grafted in the brain, that Holland goes home, is his girlfriend, quil’ awaits, valls, for GAYS, everyone does what he wants, too!

How Britain put the top Nazis (scientifics) men at work

The V2 was invented by scientists from Nazi Germany

German scientists and technicians have been removed at the end of the second world war and put in work in Britain under a secret programme to plunder trade secrets and intellectual property of the defeated nation assets, the Government declassified documents revealed.

A unit of the British army of elite captured hundreds of Germans in possession of Nazi scientific and technical know-how and transported across the channel to work in companies and Government departments private.

Others were forced to go to Britain, where they were interviewed by commercial rivals and detained if they did not reveal trade secrets.

The unit, called T-Force, was lightly armed and highly mobile.

Following the landing, it was loaded to grab something scientific or military value.

The objective was double. The scramble to discover Nazi military secrets in the dying days of the war was seen as useful to put an end to the conflict in the far East and the method by which Britain could benefit from German knowledge to give it a commercial edge that it rebuilt its economy ravaged by war.

As the cold war developed, he was also part of a campaign to prevent the Soviet Union to enjoy active nazis scientific and industrial.

Documents of the Ministry of Foreign Affairs, marked ‘top secret’ and discovered at the National Archives in Kew, show that, in addition to these supposed Germans have volunteered to work in Britain, hundreds more were gathered and transported to the United Kingdom against their will.

The documents admit that methods resembled those of the Gestapo secret police of Nazi Germany.

A memo written by an official working with the British army in Germany in August 1946, explained the procedure. « Usually an NCO arrives unannounced, at home or in the office of the German and warns that it will be necessary.

It gives all the details of the reasons and he presented his letters of credence.

« Some time later the German is seized (often in the middle of the night) and removed under guard. »

« This procedure is enjoying many of the methods of the Gestapo and also causing large and unnecessary inconvenience to the individual and the industry employs, it is required to create feelings of anxiety and insecurity ».

Abductions were conducted in the area under British control of the Germany after the war under the command of the two organizations.

One, the British Intelligence objectives Subcommittee (Bios) was composed of armed forces and representatives of Whitehall and was responsible to the Cabinet.

The other was the Agency of Information of (technical) field or Fiat, a joint Anglo-American military intelligence unit which has affected scientists for « forced evacuation » zones Americans and French and Berlin.

Both had offices in London, where investigators would be sent to Germany, looking for human resources so that machines that could be returned to England. Representatives of large companies such as here, BSA and Courtaulds tools included in the teams.

After the war, T-Force was created in the Section of Exploitation of enemy Personnel, who escorted the Bios and investigators of Fiat and took scientists and technicians are identified as being in possession of knowledge useful to the United Kingdom.

After their interrogation, which could last for months, they have been released or put to work in Britain. Those who worked were paid 15 shillings (75 p) per week.

Files suggest that up to 1 500 scientists and technicians have been identified for removal to the United Kingdom « they are ready or not ».

All the occupying powers used various methods to plunder the Germany of its scientific and technical know-how. In 1947, there was concern that this hindered the reconstruction of the Germany, and programs have been arrested.

Policy to force scientists to work in the United Kingdom changed by offering them contracts, with many taking your work with aerospace companies and British armament.

Summary of ‘Black budget’ details the achievements of American espionage network, chess and objectives

By Barton Gellman and Greg Miller 29 August 2013 track @bartongellman track @gregpmiller

U.S. spy agencies have built a colossus of intelligence since the attacks of September 11, 2001, but remain unable to provide critical information to the President on a range of threats to national security, according to the budget of the Government Top secret.

$52.6 billion « black budget » fiscal 2013, obtained by the Washington Post of entrepreneur former intelligence Edward Snowden, maps a bureaucratic and operational landscape that has never been subjected to public scrutiny. Although the Government issued each year its overall level of intelligence spending since 2007, he has not disclosed how it uses the money or how it performs against the objectives set by the President and Congress.

Summary of 178 pages budget for the National Intelligence Program details the successes, failures and the objectives of the 16 spy agencies that comprise the U.S. intelligence community, employing 107 035 people.

The summary describes advanced technologies, agent recruitment and ongoing operations. The post is retained some information after consulting with U.S. officials who have expressed concerns about the risk to the sources of information and methods. Sensitive details are so widespread in the documents that the Post publishes only tables and maps online.

« The United States have made a considerable investment in the intelligence community since the terrorist attacks of September 11, a time which includes the wars in Iraq and Afghanistan, the Arab spring, the proliferation of weapons of mass destruction technology and asymmetric threats in areas such as cyber war, » Director of intelligence National James r. Clapper Jr. wrote in response to inquiries from the Post. (F Y 2013 Budget Justification – National Intelligence Program Summary Vol 1, Congressionnal to read) Inside the BLACK BUDGET. Read the documents

Inside the secret « black budget ».

Select view pages of the Bureau of the budget from 2013 Top-secret of the Director of National Intelligence with key sections annotated by the Washington Post.

« Our budgets are classified as they could provide an overview of the foreign intelligence services to discern our national priorities, capacity and the sources and methods that allow us to obtain information related to threats, » he said.

Among the notable revelations in the budget summary :

●Spending by the CIA has risen above that of any other spy agency, with $14.7 billion in funding requested for 2013. Broadly, the figure exceeds estimates from outside and is nearly 50 percent higher than the National Security Agency, which conducts operations of listening and has long been regarded as the giant of the community.

●the CIA and NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to the « operations offensive cyber.

●Long before Snowden leaks, the « abnormal behavior » worried American intelligence community by the employees and contractors who have access to classified material. The NSA provided ward off a « potential insider compromise of sensitive information’ in re-student at least 4,000 people this year, who hold high-level security permissions.

●U.S. intelligence officials focus actively on friends, but also enemies. Pakistan is described in detail as a ‘intractable target’, and counter-intelligence operations « focus strategically against [the] priority target of China, the Russia, the Iran, Cuba and Israel. ». The latter is an ally of the United States, but a history of attempts to spy against the United States.

●in words, acts, and dollars, the intelligence agencies remain fixed on terrorism as the most serious threat to national security, which is listed first among the five « objectives of the mission. Counter-terrorism programs employ one out of four members of the population active intelligence and account for one-third of the program’s expenditures of intelligence.

●the Governments of Russia, China and the Iran are difficult to penetrate, but North Korea is perhaps the most opaque. There are five ‘gaps’ in the US intelligence services on Pyongyang nuclear and missile programmes and analysts know virtually nothing about the intentions of the North Korean leader Kim Jong a.

Formerly the Justification of the Budget of the Congress for the National Intelligence program, the represents the « Top secret » blueprint spending levels proposed for intelligence Chamber and of the Senate in February 2012 committees. Congress may changes made before the start of the fiscal year Oct. 1. Clapper should publish total actual spending figure after the fiscal year ends September 30.

The document describes a constellation of spy agencies following millions of surveillance objectives and conduct operations that include hundreds of lethal strikes. They are organized around five priorities: the fight against terrorism, stop the spread of the nuclear and other unconventional weapons, warning of the American leadership on critical events abroad, defending against foreign espionage and cyber-operations.

In an introduction, Clapper said the threats in the United States « nearly defy classification. » He warned of « difficult choices » as the intelligence – sometimes referred to as the ‘IC’ – community seeks to curb spending after a decade of budget increases, often two-digit.

The current draft budget projected that expenditures remain roughly level until 2017 and akin to a case against substantial reductions.

« The IC has never called to master this complexity and so many questions in an environment with limited resources, » Clapper wrote.

An empire of espionage

The summary provides a detailed overview of the way in which the U.S. intelligence community has reconfigured the massive injection of resources that followed the attacks of 2001. The United States has spent more than $500 billion on intelligence during this period, an expense that U.S. officials say has succeeded in its main goal: preventing another catastrophic terrorist attack on the United States.

The result is an empire of espionage with resources and a scope beyond those of any opponent, kept even now by spending which equals or exceeds the levels at the height of the cold war.

The current total budget request was 2.4 percent lower than in fiscal year 2012. In constant dollars, it was about twice the estimated size of the budget 2001 and 25 per cent higher than that of 2006, five years after what was called then the ‘war against terrorism ‘.

Historical data on U.S. intelligence spending are largely non-existent. By extrapolation, experts have estimated that expenditures for cold war probably culminated in the years 1980 to an amount that would be the equivalent of $71 billion today.

Expenditures in the most recent cycle exceeded this amount, based on the $52.6 billion in detail in documents obtained by the Post plus a separate $23 billion spent on intelligence programs that most directly support the U.S. Army.

Lee, a Democrat from Indiana who chaired the Intelligence Committee of the Chamber and has co-chaired the commission that investigated the attacks of Sept. 11, said that access to the details of the budget will enable an informed public debate on spending for the first time, intelligence as much as disclosures Snowden NSA surveillance programs attracted the attention of operations that had collected data on nearly every American citizen.

« A large part of the work that made the intelligence community has a profound impact on the lives of ordinary Americans, and they should not be excluded from the process, » said Hamilton.

« No one claims that we are so transparent as to create a hazard to the country », he said. But, he added, « there is a State of mind in the community of national security: ‘Let us, we can make it, Americans must trust us.' » They bring it to extraordinary length so that they resisted a period of transparency of the decades…. The burden of persuasion as to keep something secret should be on the intelligence community, the burden should not be on the American public. »

Experts have said that access to details on American spy programs is unprecedented.

« It was a struggle of Titanic just to get the number of high-end leaked budget, and that has only been done consistently since 2007, said Steven Aftergood, expert at the Federation of American Scientists, a Washington-based organization that contains an analysis of national security issues. » But a true understanding of the structure and operations of the bureaucracy of intelligence has been completely out of public reach. This kind of material, even on a historical basis, simply could not avail. »

The only significant repository came in 1994, when a Subcommittee of Congress inadvertently published a partial rupture of the National Intelligence program. At the time, the CIA represents only $4.8 billion budget which amounted to $43.4 billion in 2012 dollars. The NSA and the Office National recognition, which operates satellites and other sensors, required substantially more shares in the budgets of intelligence US until years after the end of the cold war.

Over the last decade, they took a back seat to the CIA.

The NSA was in line to receive $10.5 billion in 2013, and the NRO was getting $10.3 billion – both away from the CIA, whose share has jumped to 28% of the total budget.

Overall, the U.S. Government spends 10 times more on the Department of defense as it does on the spy agencies.

« World our is as fluid and unstable as it was in the last half century, » Clapper said in his statement to the post. « Even with stepped up spending on the IC during the last decade, the United States spend currently less than 1% of GDP on the intelligence community. »

Dominant position

The dominant position of the CIA is likely to stun the outside experts. It is a remarkable recovery for an agency that seemed on the verge of losing the power and prestige after acknowledging intelligence failures before the attacks of 2001 and the invasion led by the United States in 2003 of the Iraq.

The outbreak of the Agency’s resources funded secret prisons, a controversial interrogation program, the deployment of lethal drones and a vast expansion of its center of fight against terrorism. The Agency has transformed a service of spying on the evil out of the cold war in a paramilitary force.

The CIA has devoted billions of dollars to recruit and train a new generation of case officers, with the workforce from approximately 17,000 there is ten years to 21 575 this year.

The Agency’s budget allocates $2.3 billion for human intelligence operations and $2.5 billion to cover the cost of the support of security, logistics and other requirements of these missions worldwide. A relatively small amount of this total, $68.6 million, have been assigned to the creation and maintenance of ‘cover’, ‘the false identities used by agents abroad.

There’s no specific entry for the fleet of CIA drones armed in the summary budget, but a broad topic boards dimensions of expanded paramilitary role of the Agency, providing more than $2.6 billion « programs of covert actions » which may include the drone operations in Pakistan and Yemen, payments to the militias in Afghanistan and Africa and attempts to sabotage the Iranian nuclear program.

The black budget is turned on for the first time the burden of the intelligence of the wars in Afghanistan and Iraq. For 2013, the U.S. spy agencies were projected to spend $4.9 billion on « overseas contingency operations. » The CIA accounts for about half of this figure, an amount taken into account in its overall budget of $14.7 billion.

These war spending should shrink as in the United States withdraws forces from Afghanistan. The budget also States that the intelligence community has reduced the number of contractors it hires over the past five years by about 30%.

Critical gaps

Despite the huge expenditure, budgetary action plan catalogs persistent, and in some cases reviews blind spots.

Throughout the document, U.S. spy agencies attempt to assess their efforts in tables if related to school newsletters, generally citing progress, but often grateful that only a fraction of their questions can respond – even as a priority above all the community, fight against terrorism.

In 2011, the budgetary assessment says at least made intelligence agencies « moderate progress » on 38 of their fight against terrorism top 50 shortcomings, the term used to describe the dead angles. Several concern the movement the Lebanon Hezbollah an enemy of Israel that has not attacked American interests directly since the 1990s.

Other blank spots, which include questions about the safety of the nuclear components of Pakistan when transported, the capabilities of generation of hunters in China, and how the heads of Government of the Russia are likely to respond to « potentially destabilizing events in Moscow, such as major events and terrorist attacks. »

A table describing the efforts made to resolve the key questions about biological and chemical weapons is especially dark. U.S. agencies set annual targets of at least five categories of collection of information related to such weapons. In 2011, the agencies made progress on two gaps; a year earlier, the mark was zero.

Documents describe the expanded efforts to « collect on countermeasures Russian chemical warfare » and evaluate the safety of biological and chemical laboratories in Pakistan.

An array of the ‘gaps’ listed five for the North Korea, more than for any other country who has exercised or exercises a nuclear bomb.

The intelligence community seems particularly intimidated by the emergence of « homegrown » terrorist who are planning attacks in the United States without direct support or instructions from abroad, a threat has made this year, after the budget has been submitted, in two bombings during the Boston Marathon.

The National Center for the fight against terrorism convened dozens of analysts others in attempts to identify the ‘indicators’ which could help responsible enforcement Act include the path of religious extremism, violence. The FBI has been online for funding to increase the number of agents who surreptitiously follow activity on jihadists Web sites.

But a year before the bombings in Boston, searching for a meaningful overview in the stages of radicalisation has been described as one of ‘most difficult intelligence gaps.

Monitoring high-tech

The documents indicate clear dependence of longtime American spy agencies on technology remains intact. If anything, their dependence on surveillance systems of high technology for filling the gaps in human intelligence has intensified.

An article on North Korea says that the United States has surrounded everything except the country of nuclear weapons with surveillance platforms. Remote ground sensor monitor seismic activity and sweep the country of signs that could build new nuclear sites. U.S. agencies seek to capture photos, samples of air and infrared imaging « around the clock. »

In Iran, technologies and new surveillance techniques helped to identify suspected nuclear sites that had not been detected in images satellite, analysts according to the document.

In Syria, listening to the NSA were able to monitor communications unencrypted between senior military officers at the beginning of the civil war there, a vulnerability forces of President Bashar al-Assad apparently later recognized. One of the functions of the NRO is to extract data from sensors placed on the ground near suspected sites of illicit arms from Syria and other countries.

Through this catalogue of technical prowess, a category is portrayed as especially indispensable: signals intelligence, or SIGINT.

Capacity of the NSA to monitor e-mails, phone calls and traffic Internet came under control again in recent months as a result of revelations of Snowden, who has worked as a specialist in computer science the agency contract before storage of secret documents and then to flee, first to Hong Kong, then to Moscow.

The NSA was projected to spend $48.6 million for research projects to help « to deal with information overload, » a professional risk that consumption volumes increased sharply by fibre optic cables and Silicon Valley Internet providers.

The Agency’s capacity to monitor the communications of al-Qaida agents is described in the documents as « often the best and the only way compromising the apparently insoluble objectives. »

Interception of signals were also served to guide UAV flight paths, and collect clues to the composition of the leadership of North Korea to assess the Russia Government contingency plans in the event of a terrorist attack in Moscow.

The resources allocated to the interception of signals are extraordinary.

Nearly 35,000 employees listed in a category called the programme consolidated Cryptologic, which includes the NSA surveillance and the components of code-breaking of the Air Force, army, Navy and Marines.

The NSA is planning secret missions at high risk, less known part of its work, for planting what he calls « radio frequency of tailor-made solutions » – close in sensors to intercept communications that do not pass through global networks.

Even the CIA spends $1.7 billion, or almost 12 percent of its budget, to efforts to technical collection, including a joint programme with the NSA, called « CLANSIG, » a secret program to intercept the radio and telephone communication from hostile territory.

The Agency is also tracking systems « that minimize or eliminate the need for physical access and enable deep concealment of operations against hard targets. »

The CIA has deployed new biometric sensors to confirm the identities and locations of al-
Qaida agents. The system was used in the campaign of CIA drones.

Spending on satellite and almost all other categories of collection systems should decrease or remain stagnant in coming years, Washington is faced with cuts in Government. But the budget 2013 intelligence called increased investment in SIGINT.

Counterintelligence

The budget includes a long section on the financing of the programmes of counterintelligence designed to protect against the danger represented by foreign intelligence services, but also the treachery from within the ranks of American spy.

Document outlines programs to alleviate threats initiated by trusted insiders who seek to exploit their access to sensitive to harm American interests information.

Agencies had budgeted for a major initiative of counter-intelligence in fiscal 2012, but most of these resources were diverted to an all-hands of successive flood of classified data emergency response, published by the anti-secret group WikiLeaks.

For this year, the budget has promised a « refocusing… in safeguarding classified networks » and a « strict monitoring of potential high-risk, high-gain and entrepreneurs » – computer coders young, traditional with the powers of the NSA needed.  »

Among them was Snowden, then a computer scientist of 29 years of the contract including the NSA trained to work around the security of computer networks. He copied thousands of highly classified documents in an installation of the NSA in Hawaii and are preparing to flee, as the Agency has undertaken the new security scanning.

«NSA will initiate a minimum of 4 000 periodic reviews of possible compromises of sensitive information,» according to the budget, analysis of its systems for the « anomalies and alerts.»

Publicités

Laisser un commentaire

Entrez vos coordonnées ci-dessous ou cliquez sur une icône pour vous connecter:

Logo WordPress.com

Vous commentez à l'aide de votre compte WordPress.com. Déconnexion / Changer )

Image Twitter

Vous commentez à l'aide de votre compte Twitter. Déconnexion / Changer )

Photo Facebook

Vous commentez à l'aide de votre compte Facebook. Déconnexion / Changer )

Photo Google+

Vous commentez à l'aide de votre compte Google+. Déconnexion / Changer )

Connexion à %s