Malcolm Nance

  • Andrei Zaharkevichidézett2 évvel ezelőtt
    chain is coincidence, or if it bears the marks of hostile intent. Ian Fleming, the old British Secret Intelligence Service officer who created the fictional character of James Bond, characterized the amazing events in his books with an observation in his 1959 book Goldfinger: “Once is happenstance. Twice is coincidence. Three times is enemy action.”
    Times have changed since Mr. Fleming’s Dictum. In light of current trends in the intelligence business, I like to characterize this phenomenon as Nance’s Law of Intelligence Kismet: “Coincidence takes a lot of planning.”
    Reading about the DNC hack was not initially alarming; hackers had also penetrated the Obama and McCain campaigns in 2008. The DNC hack was newsworthy but not really noteworthy until it was paired with two additional events. At the time of the hacks I was writing a massive tome on hackers associated with ISIS and al-Qaeda, so I was attuned to any information about electronic data theft. Then on June 1, 2016 one of my military hacker friends pointed out that an entity who called himself Guccifer 2.0 had opened a WordPress page and was dumping information stolen from the DNC hack.
    Guccifer 2.0 claimed he had all the hacked material from the DNC and would be releasing it through his webpage. The name Guccifer struck a nerve, as the real Guccifer, a prolific Romanian hacker, had just been extradited to the United States. Guccifer 2.0 was a copy-cat, and a lazy one at that. My hyper-suspicious intelligence mind started kicking into gear and the game of multidimensional chess was on.
    Two weeks later Steve Biddle, the national security writer for the snarky web magazine Gawker posted the entire Donald J. Trump opposition file from the DNC’s servers. Immediately both Fleming’s Dictum and Nance’s Law struck at the same time. There was no way that the single most damaging (and dull) file from the DNC hack would be “accidently” released weeks before the Republican National Committee convention. It was straight from the Karl Rove political playbook: Release damning information early, hold bad information until appropriate. More startling was that word was spreading across the global cyber security community that the DNC hack and Guccifer 2.0 had Russian fingerprints all over it.
    I started my career in Naval Intelligence when I entered as a Russian language interpreter sent to DLI, the Defense Language Institute. For years before my Navy enlistment I had studied the Soviet Union and the KGB’s history of political intrigue in preparation for a career in intelligence. Little did I know that two years of studying Russian on my own and four months of waiting at the Presidio of Monterey for my language school slot would result in my taking a completely different language. I was assigned
  • Andrei Zaharkevichidézett2 évvel ezelőtt
    I was assigned to study Arabic, then I spent decades watching the Russian client states of Libya, Syria, and Iraq, as well as their ties to European terrorist groups Red Army Faction, Action Direct, the Irish Republican Army, and the Combatant Communist Cells. No matter what my target was, the KGB cast a shadow across every spectrum of my operations. Whenever we conducted a mission involving Syria, we watched for Russian cruisers and destroyers heading to Tartus, or the IL-38 “May” surveillance aircraft that dogged us and kept a weather eye on the Soviet naval units in the Gulf of Sollum anchorage off the Egyptian and Libyan border. Russian “Illegals”—covert intelligence officers—would try to attach themselves to us like leeches in seedy strip clubs in Naples or when puking on the streets of the Marseilles red light district. We went to monthly counterintelligence briefings that explained how the KGB recruited assets, and how they manipulated even the lowest-level young soldier, sailor, or marine through heterosexual and homosexual “honeytraps.”
    The formerly classified briefings
  • Andrei Zaharkevichidézett2 évvel ezelőtt
    The formerly classified briefings of Yuri Bezmenov, now posted up on Youtube.com, are where we learned of the targeting and recruitment techniques of the KGB. Until the fall of the Soviet Union the watchword was “Beware of the Bears. The Bears are everywhere.”
    After the fall of the Soviet Union the KGB became known as the FSB. In the last ten years Russian intelligence melded all of its offensive techniques to create a new kind of war: Hybrid Warfare—a melange of hostile cyber, political, and psychological operations in support of their national objectives, whether during peacetime or in open war. It is now standard operating procedure.
    A few months after the hacks, at the start of the Democratic Party Convention in Philadelphia, the WikiLeaks organization, led by the information transparency activist Julian Assange, leaked the stolen documents with the intent to “damage” Hillary Clinton. The information leak had the intended effect, as airing the DNC’s dirty tricks conducted against the Sanders campaign created a rift between diehard Bernie Sanders supporters, and led to the resignation of Representative Debbie Wasserman-Schultz as chair of the DNC
fb2epub
Húzza és ejtse ide a fájljait (egyszerre maximum 5-öt)