Advertisement
Margus

Sovietism and Millitary intelligence

Oct 7th, 2019
399
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.71 KB | None | 0 0
  1. Travis D Huzzah jagas viidet.
  2. 7 tundi
  3. This Intelligence Committee report is more interesting than most. Gets into details around page 4.
  4. https://www.intelligence.senate.gov/sites/default/files/documents/os-trid-033017.pdf
  5. INTELLIGENCE.SENATE.GOV
  6. www.intelligence.senate.gov
  7. 7 kommentaari
  8. Meeldib
  9. Kommenteeri
  10. Kommentaarid
  11. Margus Meigo
  12. Margus Meigo Text from third page..2017 Doc
  13. http://archive.is/lSmk2
  14. http://web.archive.org/.../documents/os-trid-033017.pdf
  15. vs
  16. http://web.archive.org/.../documents/os-trid-033017.pdf
  17. ( even by keeping situation really small and non excistant, compared to Global Operations for World Domination in multible undedectable Fronts -> as they are part of everyday culture, from news outlets to food stores and manufacture, education & teacher boards. ...
  18. // besides all th hypnotized and varius way forced under control orgnisations....from fake pedoFear to real mistakes.....few are who are not under controll and they are under another kind of usages... or on RedTaskList. ... ... some of the opposing Engines they actually NEED to be to use them as weels for manyof thir own work and development...elementary but still, just must remeber, comes time, when these wels might not be needed anymore or when they come bothersome.. then is needed to do some "Hands dirty" .. but as most of the country is in sleep/hypnozes by that time.. .//
  19. . it still looks, from this tiny bit .. well that most liklly they started in purpose to leak at least some.. as for public to know and to make people to look in few directions that is sacrifased,will be won back by taking attention away from "10 000 other things", that proceed with invasion fluid way .) :
  20. txt:
  21. " ... infrastructure, their evolving methods of operation, their targeting
  22. behavior, their evolving operational security, and—perhaps most
  23. importantly—the mistakes the Russian operators made again and again. In
  24. 2014 a shift in tactics became apparent especially in military intelligence: a
  25. once careful, risk-averse, and stealthy espionage actor became more and
  26. more careless, risk-taking, and error-prone. One particularly revealing
  27. operational security slip-up resulted in a highly granular view of just one
  28. slice of GRU4 targeting between 16 March 2015 and 17 May 2016—that
  29. slice contained 19,300 malicious links, targeting around 6,730 individuals.5
  30. A high-resolution picture of Russia’s digital espionage activities emerged.6
  31. Third, in past 2 years, Russian intelligence operators began to combine the two,
  32. hacking and leaking—or digital espionage and active measures.
  33. By early 2015, GRU was targeting military and diplomatic entities at
  34. high tempo, especially defense attachés world-wide. Among the targets are
  35. numerous senior US military officers and defense civilians, for example
  36. the private accounts of the current chairman of the Joint Chiefs of Staff,
  37. General Joseph F. Dunford; Generals Philip Breedlove, Wesley Clark, and
  38. Colin Powell; Navy Captain Carl Pistole, or current Assistant Secretary of
  39. the Air Force Daniel Ginsberg. Among the diplomatic targets were the
  40. current US ambassador to Russia, John F. Tefft; his predecessor Michael
  41. McFaul; former Permanent Representatives to NATO Ivo Daalder and
  42. Kurt Volker; and well-connected security experts Anthony Cordesman,
  43. Julianne Smith, and Harlan Ullman. The targets also included a large
  44. number of diplomatic and military officials in Ukraine, Georgia, Turkey,
  45. Saudi Arabia, Afghanistan, and many countries bordering Russia,
  46. especially their military attachés, all legitimate and predictable targets for
  47. a military intelligence agency. Russian intelligence also targeted wellknown Russian critics, for example the author Masha Gessen, Garry
  48. Kasparov, and Alexei Navalny, as well as the Russia-based hacker group
  49. Shaltay Boltai. In early 2015, the same entity often referred to as APT28 or
  50. FANCYBEAR had successfully breached not just the German Parliament;7
  51. the Italian military;8 but also Saudi Arabia’s foreign ministry.
  52. Then, in May and June 2015, the first publicly known large-scale
  53. disinformation operation, dubbed “Saudi Cables,” tested an innovative
  54. tactic: hacking a target, exfiltrating compromising material (kompromat),
  55. setting up a dedicated leak website under false flag, and then passing files
  56. to Wikileaks for laundering and wide distribution.9 Between June 2015
  57. and November 2016, at least six front organizations sprung up as outlets
  58. Muuda või kustuta
  59. DISINFORMATION
  60. ARCHIVE.IS
  61. DISINFORMATION
  62. DISINFORMATION
  63. Meeldib
  64. · Vasta · Eemalda eelvaade · 1 h
  65. Margus Meigo
  66. Margus Meigo @same time the core elementary
  67. https://www.fiia.fi/.../the-cyber-enabled-information...
  68. , talked in here,
  69. Fins and Estonians find it at tims rediculas, that even they was CLEAR and UNDERSTANDABLE like 100 y ago, and RALLY clearto rodinary house wife, in understanding, about how soviet utilizes ALL insitituions and VERYTHING they can from Cartoons to human personal relationships, in a MASS scale .. all what is also known in West that"the cia" is doing but.. it is really minicore compared to entir CommIntern'al holisitc PLANTARY plan that has ben lastin, last version, longer then few generations.
  70. So partof the text:
  71. " Western thinking and doctrine on cyberspace operations often emphasize the technological aspects of the operations. However, in assessing the Russian operations, it is beneficial to understand the activities in the context of Russian thinking on the information space and to what ends it might be utilized. This paper also examines some challenges for the West, namely how to protect individuals from nation-state actors in cyberspace, and how the dynamics of attack attribution can complicate responses by governments.
  72. RUSSIA’S APPROACH TO THE INFORMATION STRUGGLE
  73. Russian military thinking views the information space holistically, recognizing the importance of psychological effects.3 In contrast with the Western concept of cyber operations, Russian writing refers to information-technical effects as a subcomponent of the overarching information struggle, informatsionnoye protivoborstvo. The word “struggle” aptly describes the Russian approach, as the term “information warfare” conveys a mental image of an overt and clearly identifiable conflict, while in reality the actions are thought to be ongoing even in peacetime.4 This also contributes to ambiguity, which may be a desirable feature of influence operations – does the target even realize that they are the subject of such actions?
  74. In 2013 Russian military thinkers provided insights into how the Russian military leadership characterized the nature of future wars, and the role of psychological operations therein. The now famous article by Chief of the General Staff Valery Gerasimov5 on what some interpret as a recipe for “hybrid warfare”, as well as an article in the Russian Ministry of Defence’s journal Military Thought6, elaborate on what new-generation warfare might look like. Specifically, aggressors are expected to use non-military actions, utilizing “powerful information technologies”, and involving all the public institutions of the target country, with the goal of undermining the target’s social system. This is in line with interpretations published as a part of Jānis Bērziņš’s 2014 report on Russian new-generation warfare, whereby the human mind is seen as the primary battlefield, with information and psychological warfare playing a dominant role.
  75. Muuda või kustuta
  76. The cyber-enabled information struggle: | FIIA – Finnish Institute of International Affairs
  77. FIIA.FI
  78. The cyber-enabled information struggle: | FIIA – Finnish Institute…
  79. The cyber-enabled information struggle: | FIIA – Finnish Institute of International Affairs
  80. Meeldib
  81. · Vasta · Eemalda eelvaade · 1 h
  82. Margus Meigo
  83. Margus Meigo 2016....
  84. http://web.archive.org/.../2019/05/21/spygate-6-april-2016/
  85. " Less than two weeks later, on 19 April, the front website DCLeaks.com was registered as a leak outlet for hacked files.10 "
  86. http://web.archive.org/.../james-comeys-secret-twitter.../
  87. "ProjectExile7 follows 27 other accounts, the majority of which are either reporters, news outlets, or official government and law enforcement accounts. The New York Times’ Adam Goldman and David Sanger and the Washington Post’s Ellen Nakashima and David Ignatius, all of whom have been aggressively covering the FBI investigation into Trump’s contacts with Russian agents, made the list"
  88. hahaha:
  89. "“(U)witting agents” were used, including “WikiLeaks.”
  90. Fact: No evidence suggests Russian US election hacking.
  91. Fact: No evidence suggests any hacking.
  92. Fact: Credible evidence points to disgruntled Democrat party insider leaks "
  93. http://web.archive.org/.../www.globalresearch.ca.ln.is/LWl3U
  94. // before "looking in to hacking" they have to also look in to WHAT political party is actualy, ACTUSALLY usa party ...
  95. And from these thatthink that are.. or THAT ARE Not.. how are they used.. for advancement, is EASY for Soviet to burn their own child if needed, if this cry and hurt will bring some larger advantage by envoking motions or movement.. .. even in Literal sense, using literal child torture is no mor then using Duck Voice maker in hunting, (and as Russia and USA #trumpteam weapon biz meeting largestlastone was told.. USA and Russia is MOST similar nations in world, even justfor the desire of Shoot live things... ..and this desire has been supressed for Russian side too long..so they work on Law.. to give HARD weaponary rights to EVRY Russian citizen, ...and try to use UN for that and USA Gun law's as draft.. and for justification.. )
  96. http://web.archive.org/...//www.oipapio.com/question-9576434
  97. " 3 Answers:
  98. Something like "alternative retaliation" or "alternative retaliatory measures"? Just thinking aloud here, giving food for thought"!
  99. The closest thing to what you look for might be active measures, which as we will see is a broad term. According to Historical Dictionary of Russian and Soviet Intelligence:
  100. After World War II, the Soviet intelligence service used the term "active measures" to describe covert political action designed to affect the political opinion of unfriendly and neutral countries.
  101. A somewhat recent report by the Senate Intelligence Committee characterises them as follows:
  102. The tried and tested way of active measures is to use an adversary’s existing weaknesses against himself, to drive wedges into pre-existing cracks: the more polarized a society, the more vulnerable it is—America in 2016 was highly polarized, with myriad cracks and fissures to drive wedges into
  103. Now, you may ask, do active measures include the cyber attacks explained in your example? Yes, if we go by Cyber Strategy: The Evolving Character of Power and Coercion, which says about Russian DDoS attacks (emphasis is mine):
  104. This distribution is indicative of Russian strategic practice, leveraging cyber operations as part of broader active measure campaigns designed to influence targeted populations and undermine a rival state from within. "
  105. --
  106. http://web.archive.org/.../the-cyber-enabled-information...
  107. Muuda või kustuta
  108. SpyGate: (6) April 2016
  109. WEB.ARCHIVE.ORG
  110. SpyGate: (6) April 2016
  111. SpyGate: (6) April 2016
  112. Meeldib
  113. · Vasta · Eemalda eelvaade · 1 h
  114. Margus Meigo
  115. Margus Meigo // Few more lines on my heart, yah, i know is a lot but will try to kep in one thread..//
  116. Basically all these URL 's
  117. ordinary ones,
  118. Was "First time save" ... as archives are now ALL the time cleaned from these kind of materials and news articles..
  119. hav found extremlly informative and old, known NY times articles that "has not been saved" .. and that after re-saving would be gobe most likelly again soon.. but not too soon, to make it too appearent.. ... specially links that is not visited, is assumed safe to eliminate from archivs first..
  120. also no news when hundreds of BILLIONS of webrecords was eliminated Years ago from Archive..org. Top of that, new law that any expired website archive can be assasinated legally by re-registring domain and demanding archiveto be cleaned forthis URL..
  121. ... so all this old nineoneone.info pages..
  122. ...
  123. Now on the senate website, when one try to save:
  124. " Sorry, a potential security risk was detected in your submitted request. The Webmaster has been alerted. "
  125. So even so basic and simple.,.. SMALL information.. eventually is something that would not be readed... but as numbr was SO humble... thy can be also used as reduclate USA intelligence, as comparing with real project and numbers is like they have to investigat, to find from a some planet huge car manufacture plant & proofs, and they managed to get few pictures number plates ( of crashed or honey trap field old tmoraly cars..).
  126. Some level exposure, IS NEEDED for soviet intlligence to work appropriatelly,
  127. as You need to know who are the ones who ar interested about knowing, and study their actions from all sectors,
  128. test hypnosis on people,
  129. mention leaked data parts in offices around the world and study how is reacted by oridnary colleagues.
  130. In MOST corporations and big companis, MUST be a Agent's more then one, not just managment but to lowest, up to cleaner lady's as they all needed for various tests and works.
  131. There is little Complete meaningless companis, or orgnizations, as they can mostly all be used for somthing.
  132. Farmingcommunity's perhaps is most bothersome for new age alien soviets... (they pretty much the same crw in some way as th ones who imposed 8 day slavery in Entire USA as standard and called it libration of slaves.,.by making all slaves.)
  133. but when i did look in to it....was appearent, that a lot of of USA farming insititutions schools is under sure strong Soviet idelogy and occult like structure..
  134. not as much as another soviet occult known structure called the Hubberst...skiooontoloogy..
  135. but still.. USDA (dep of agriculture) it self might stand.. but as long they NOT jet getting, that they, they students, and future scintists, are AS IMPORTANT subject for hacking, their students mind,> for gtting in future "ALL of it" owned and directed by Soviet/RomanEmpire (or at est Chinese .p ) forces..
  136. as long so elementary thing is not understood...
  137. or that soviet fake jew universityes in USA was made mostly for ELIMINATION of Jewishness.. not for invoking true core of rabbis like Manis Freidman...
  138. far from it.. now they have "trump kindof jews" ..that w know is anything but jews.,.. but thats probabaly a good thing.
  139. in many ways.
  140. but as last generations, in USA, the Education AND Teachers UNION (no hidding there..) was run directly by communists, public and private ones... (they NEWER all public) ... then the worry "what they might do with children heads" is long past perhaps few generations back.. but ... but is not..
  141. As there is more deeper they can go and AND the hypnosis, projects need to be kept, artificially, need to keep humans artifically underdeveloped and keep them away from self image developing and communiti human/nature orjentated feelings and realizations. Only in allowed levels when much else is washed away and controlled by lack of parents like the ower active and irational "ecco activists" who are as well, as they was on pre WW2 times, soviets orgnizations, unless they are not, then they properly not. As real country man will notice redness and will not talorate it and will grow it out from a sutents/fellow country mans as tru communists will find a way to break somones mind who thinks it slf to be superior or too good for a "light of an lenin" or Party, or somthing like that we can assume.
  142. but same time these are probabaly besides some investigators, hackers, nerds, and few other rebels and slf thinkers, one of the only locations where
  143. So when we, Estoniians read something like that:
  144. "Corporate agriculture evolved to take control of the entire production line from “farm to fork”, from the genetics of breeding to wholesalers in the US or far east. As factory farms spread, their demands dictated the workings of slaughterhouses. Smaller abattoirs, which offered choice and competitive prices to family farmers, disappeared, to be replaced by huge operations that were further away and imposed lower prices on small-scale breeders "
  145. https://www.theguardian.com/.../american-food-giants...
  146. then in our mind rings first world " Soviet Union " mindset. As corporations and Soviet union various fronts, for us newer has been had to see how they are one.
  147. And not just directlyone, but how they Musteventually become and how thy can be and are used, remotelly by education, hypnosis, pentagram magic or by force of many kinds.
  148. Activating a lot of robotic dendencies of people and what else..
  149. As anyone who wears a Tie, is already SAME TOOL by SAME SYSTEM... top of that who supports temporsally Law before Justice and Rightjosness, is anothwr dangerous tools and nslavement agents that should be fixd on the spot. Or atleast put on list to be fixed.
  150. Muuda või kustuta
  151. Foto kirjeldus ei ole saadaval.
  152. Meeldib
  153. · Vasta · 30 min
  154. Margus Meigo
  155. Margus Meigo i try to write as "sovit mind proof" as possible hahahaha
  156. Muuda või kustuta
  157. Meeldib
  158. · Vasta · 29 min
  159. Margus Meigo
  160. Margus Meigo point in short , is like
  161. when they "discover" that for invasion, by largest planetary forces in history, : ALL institutions and resources and methods in combination is used that is possible and known from history,
  162. ... IN a way that is most needed way appearent and not appearent for maximum long term effeciency (as they not work on 4 year terms..) .. discovering SO elemntary things and reporting it as discovery..
  163. And not fallowing up then WHAT to do with it.. it self seems like sovit tech they used in here,
  164. while reporting crimes as a statistic and numbers.. .. but was NO callup for people to ACTIVATE with instructions and tools HOW, to protect ons country and soul, and love.
  165. So elementary things if not made by Big ones, then for sure.. is already.. while some small countrys will try to tweet some ..in allowed borders.. thy can only "tweet" as much ...
  166. as.. is sensible for keeping ones own country and culture and what is lft of it .. in a fearsome army of robots, who are attimes more effective and human looking then avarage Joe.
  167. And by Force of Equality..
  168. // anwya. will try to keep now .. again lower smaller text profile..
  169. // just at times i feel ,there is some who needs and thy gotit.. so is worth a risk ... i actually missed my last bus out of village to go pick up food by writtingthis, for what i prepared for yesterday, going sleep @9 to wake up 4-5PM to make it.. still did not make it.. this is my life.. controlled by som othr..
  170. hopefully some other my higher self ...rather.. but have seen REALLY high levels with pntagrams on their millitary hats.. who work on what Youth calls 5D i guess ( fw levels , from material world outside our ordinary world but atsame time IN managing rmote or direct managing force of a human body and location what is seen by me..)) .. but it DOES seem like with "forceful country and ordinary work" ,
  171. correct kind of cleaness and some other tasks in "controlled world" IS setting some kind of freedom potential and helps to keep human self freedom (potential)
  172. attimes i my self oppose is opposite, but thatmight not be so..i would not dare to reccomend..to be poor in purpose, but if You can be poor and rich same time.. ordinary and powerful... connectd and free same time... then You emerge in to situation where You can more relaistic and safe way start to actuallyhlp humankind and keep Your share of the kingdom you make,
  173. (also by som wizardry fix the parents relationships is a must, for masters)
  174. ..but to hope that "they" will just hand You ower a queen, or queen/king with a right mindset.. would be too naive.. so when You see love and love is in it what Youare.. then this is true Core, Krnel to keep above all
  175. In General, people from walk to walk,
  176. //( can say > this is Not nothing to do with most. evryone has they own "private" world pla pla pla )
  177. but i just identified and diagnosd the most vital final Core cure and worry,
  178. and not just me, the actual Bible , Torah or whatthey call it, the Old Tstament.. last words
  179. // (Suprisingly not known by most Relgious ones i have asked it from....as they ar in to "new" testament..)
  180. was self explanatory for All cultures and beliefs across th world's
  181. Something like that: When parents and kids not able to get along and get togheder AGAIN, then the species will be rendered useless and will be extincted. AS they become too controlled, too robotic and troo souless then and TOO dangerous.. so is safer to elinminate them then to hop, thatthey manage, to complete the task for whatthey was planted on to Earth (like, to help nature to keep good Order, correct way)
  182. Kommentaari ei saa muuta. Proovi uuesti
  183. Margus Meigo
  184. Margus Meigo All this "get in to Heaven" crap, "away from earth" mntalaty, is probabaly from aliens who want us to unroot ourself .
  185. Kommentaari ei olnud võimalik postitada. Proovi uuesti
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement