Some New Tales from the Darkside, by Philip Giraldi

A lot of people now think, and regularly voice, the conclusion that Israel runs the U.S. government. Not without ample reason. From Philip Giraldi at unz.com:

The news cycle over the past week has been dominated by reports and analysis of the Signal group chat involving top national security officials discussing aspects of the recent air strikes which have been directed against the Houthis in Yemen. There are four basic issues that are being examined by both the media and by elected and appointed government officials. First is the apparent ignorance of ordering the strike at all since the panel appeared not to know very much about the target or why the US was escalating the conflict. Second, was the possibly accidental inclusion in the list of participants of a journalist who is closely connected to Zionist Israel, having voluntarily served in the Israeli Army as a prison guard, where he may have tortured Palestinians, and who plausibly is a dual national US-Israeli citizen. Third is the security of the Signal technology itself, which was reportedly initially created to permit such sharing of confidential views online for criminal purposes, but which might be vulnerable to penetration by any professional foreign intelligence service including those of Russia, China, the United Kingdom and, of course, Israel, which would have had a serious interest in what Washington was intending to do in Yemen. Fourth, is the question whether Donald Trump knew about the meeting and approved what was being discussed.

My own experience of secure communications enabling meetings goes back nearly fifty years when nearly every national security-linked facility, including Embassies and military bases, had a so called “bubble” which was enclosed and electronically sealed to prevent outside penetration to learn what was being discussed and by whom. Since that time, there have been huge advances in protecting communications but friends who are still in the intelligence community insist that what is being protected can be made vulnerable by the cyber agencies that exist in various competitive countries that spend billions of dollars to do just that.

Continue reading

Leave a Reply