You must laugh when you see the Clinton Whitewash Bureau (FBI to you) testifying with a suitably serious face, that they have no evidence of wiretapping regarding Donald J Trump. Let me explain, these things do not always happen legally. You would like to think they do, that a Judge is involved, all the paperwork nicely sorted etc. and if you think so, well, carry on living in your dream world. In Code Name Oath 19, a book which is about deep technical dives, 300 feet under the water, from submarines to recover intelligence (thus maritime reconnaissance) we discussed this aspect – allow me to quote for you and you will understand my mirth: -
… “Most certainly not.” Angelique confirmed. “We don’t trust cables or anything outside our heads.”
You would be silly to think that underwater cables are safe from spies. Not at all, in history we saw many clandestine missions to intercept them. The best-known example is probably a US operation near the Kuril Islands off the eastern coast of Russia. They called it Operation Ivy Bells where a nuclear attack boat sailed in and with the help of divers, they dropped waterproof recording pods on the lines. Later they would be back to gather the recording tapes. The happy times ended in 1981. Sadly, it was found out that the operation was betrayed by one Ronald Pelton, a NSA (No Such Agency, by God) analyst to the KGB not long after the recordings started. Of course, everyone intercepts everyone else, make no mistake, it is not only the US and today the Internet communications (undersea cables) are subjected to the same treatment. It is said that 21,000,000 (yes, million, Angelique) gigabytes per day is “harvested” and then analysed by some 550 NSA and GCHQ (the British codebreakers) analysts. Clearly, it is an impossible task to do this properly, you cannot go through such data in one day. No matter what computer search programs are used, looking for specific words like “attack, bomb, president” etc. (see Code Name OST-M where we discussed this in detail) they will never be able to go through even 8% of what they have. The entire collection system has gone crazy, it is entirely inefficient in results and almost a waste of time. History repeats here. The same happened during World War Two - the number of intercepts by far outweighed what could be broken in time to be useful (as well as what could be released to safeguard the code breaking security, Angelique). In modern America, the inefficiency is proved by the attacks that get through on mainland America and Western Europe. Unless you gain meaningful intelligence able to prevent attacks and giving a fair picture of your enemies, you are a snooper, a collector and breaking the law for no known reason. In this game results actually count, it is not an MBA solution of spending money for no known reason. I want results and so should you reading here or your family may well die in the next attack. A mate of mine wrote a book on defending yourself against such an attack (Terrorist Takedown - Jacobus Kotze - ASIN B01GYDBHLM) in which he predicted a terrorist attack once every 3 months in the US. This is serious, if your fences are not in order, or you are seen as weak, you will be attacked.
Now you may ask, what is intercepted? Everything, absolutely everything, phone calls, email messages, Facebook entries and the complete history of all searches done by you on Google or other search engines. According to Edward Snowden, not a hero in my eyes but one whose revelations can be chronicled: “Well, if you had the choice, you should never send information over British lines or British servers. Even the Queen's selfies with her lifeguards would be recorded, if they existed.” He was referring to what the Brits call Tempora, their secret interception program done from GCHQ (their codebreakers). NSA call their cable interception program by various names, Oakstar, Stormbrew, Blarney and Fairview. Nothing you do online or over the airwaves is safe from interception, nothing, make peace with that. Even if you write to me, and you are always welcome, it will be intercepted by your agencies. Surveillance became an industry of cover-your-ass and not much more. Human intelligence, the old-fashioned way, is still the best, the most reliable and the quickest, yet, this is something which modern Western Agencies are sadly lacking in, they are spending on technology, the statistics look good, the results are piss poor. (What is more, when the War on Terror kicked off, the Virginians (CIA) arrived with unlimited dollars everywhere. They would throw millions of cash to everyone and the result? You cannot now cross check anything because every shyster and his mate became informants, only talking to the money whilst every counter intelligence officer knows, or ought to know from history, that true informants are seldom interested in money. The new wave are selling bare faced lies with their souls and getting away with it, the much more useful ideological informants, were ignored. The spy market was closed to the rest or almost so, hence now MI6, useless as they are, is struggling to collaborate what informant X said, it is a mess and the MBA Solution was found in mass electronic intercepts. The idea was thus: “We spend x amount and collected y intercepts, hoorah! We are collecting entire countries data and our allied heads of state too, hoorah!” I will fire anyone’s ass if the above is given to me as a solution and tapping allied heads of state is insane, it will annoy them. The question should be, and it is most certainly not asked enough: “Show me the results?” Spending blindly and collecting blindly is not the solution, it is a technical showcase but so what? Where are the results? Overly broad non-targeted collecting aids the terrorist and annoys your friends. Yet, such practical thinking is of no use for intelligence fiefdoms. For the Directors battling for ever more funding, the hard work to get results are unimportant, they want to dazzle and bullshit for even more money. Thus they are taking the easy road, collecting even more unusable information and storing it somewhere in massive databases, it is not intelligence, and making their own mess even bigger. I know that this is abused as a weapon against the West by the terrorists. And believe me, the Virginians get seriously upset when you point out what should be logical to everyone reading here, Angelique.) I pity my American friends and readers, not only are they abused as taxpayers and I don’t know any that are not taxpayers, we don’t admire snowflakes, they are also subjected to terrorist attacks, fed mushrooms and treated as morons by the mainstream media and turds (politicians, they float in what they talk).
There are ways and means to tap underwater cables - there are close to 550,000 miles of them – the “regeneration points” where the signals are amplified are targeted by the spy agencies. This is where the best tapping takes place and such points are everywhere and then there is where these cables emerge from the oceans onto land - a choking point you can take for granted is being monitored by the country on whose territory the cables are. Everyone helps each other with the worldwide gathering and sent the information, it is not workable intelligence, to the NSA. It is said and I certainly believe it, that the Australians, New Zealanders, and Canadians are actively supporting the US and their lapdog, the UK in this, all highly illegally so. (And so do the BRICS countries, using the same intercept probes, they capture data by using light through a prism. You will never be in the know that it happened since no tapping evidence is left behind, no physical signs. This information is shared and it is vast, have no doubt. Hence, your own cables are also tapped at will. In South Africa, between 2004 and 2016 more than 3 million intercepts were done by my Service, of them, only 234 were authorised by a High Court Judge, the rest were illegal. It is laughable when the small South African intelligence budget – about $450 million per year is stated as a reason that it cannot happen at this scale. Think about it, who says the South African Government is paying for this? Wake up, look at the MI6 & CIA modus operandi in terms of joint operations, the CIA pays, the Brits beg them for funding. South Africa does not beg, the main role players here are eager to pay for access, we know how to drive hard bargains, Angelique.) … (Taken from Code Name Oath 19.)
Well, there you have it, I will make a prediction here – the illegal tapping of the Trump Campaign will come out in the future. Mr Obama will shrug and deny that he had any knowledge, and the usual politics will continue. But if you wish to read real dynamite, wait for the latest GMJ Book, Code Name Jen, to come out. You will not believe how racism and greed bit the US & UK in the ass in Iraq & Afghanistan, it caused an enormously successful espionage mission against them, run by the South Africans.
George M James is a pseudo name for the author and used for security reasons. He is an expert on counter-terrorism and counterinsurgency operations in sub-Saharan Africa, a military historian and published author of more than 50 books. In the GMJ Series, you will learn about Covert Operations, Special Forces techniques, current political analyses and military history not known outside the select few. Every GMJ Book is based on historical fact and often what is revealed in a GMJ Book is published by the mainstream media a short while later. Many of the GMJ Books are used as training material by Police Forces (SWAT) across the world. Note please that GMJ does not claim to have served in South African Army or Police Special Forces.