tv On contact RT April 14, 2020 7:30pm-8:01pm EDT
7:30 pm
welcome to on contact today we discussed the cia's hacking of the global intelligence network with william binney point you know everybody there what they're doing what they're thinking what they're planning i mean you have the opportunity to manipulate them in the way you want to because of certain tools for making certain suggestions in certain areas or you know say just simply blackmail against them or anything you can leverage against them or anything to say against somebody they really care about so you have an opportunity to do all of that. the washington post recently published a piece about a swiss company crypto agee that was actually owned by the u.s. central intelligence agency and west germans intelligence agency crypto eiji provided encryption services to over 100 governments worldwide for decades
7:31 pm
unbeknown to those governments the cia had access to the encryption tools and could therefore read high level internal government correspondence from countries including france egypt and as well and many others what this means is that at the highest levels of the us government including the white house every assassination every act of ethnic cleansing every disappearance of a dissident every terrorist attack every order to carry out torture whether that took place in guatemala or saudi arabia was known by the united states joining me in the washington studio to discuss these revelations is william binney a leading intelligence expert who worked at the national security agency for 30 over 30 years so bill it is a great fascinating story yeah were you aware of it when you know i wasn't actually go but but i mean it makes sense i mean the standard procedure. for intelligence
7:32 pm
agencies to try to get other of course countries to buy into their system well they did an amazing job in the other 123. countries. and they may even made money on it millions of dollars selling which went right back into the absolutely venture but we're talking about some very dirty regimes the shah in iran and military dictatorships and hunters in latin america india pakistan even the vatican. that's how they manage to get manuel noriega. and there is this of course. this is what intelligence services do and why they were created what they were meant to do but it does make them morally complicit because they know things they know about impending actions that will take a life or lives i was talking to before the show i covered the war in bosnia to
7:33 pm
what extent i don't know about you know what extent potentially did they know about the massacres and trevor needs a 1000 people killed. talk a little bit about that kind of moral quandary that it that it that it puts not just the intelligence agency itself but by the u.s. government into well i think it's also if you reflect back on world war 2 i think the british did some similar kinds of things when they didn't want to compromise the fact that they were reading the enigma encryption from the from the nazis so so they let things happen that they could about a lot of old british ship i mean they sacrifice to ships that's right and so so they i guess that the idea is to make a value decision is what they're doing but certainly something of this nature i would think that they could have covered up with all kinds of other kinds of inputs and not really compromised fact that they in fact were reading all these encrypted
7:34 pm
messages so although reagan apparently blew the expose the libyan well yes he did that when he that's when he did yes that's true i was a bombing at the mainland discotheque and then he got up in public and said well we read the correspondent that's right from the embassy in berlin and we know gadhafi was lying that's another point if you notice that the countries that didn't buy into this encrypted system that was trying to run the people who do better right right right but the problem is you see they were also to an extent compromised by the communications from other embassies from right countries out to their home country right so that's. they make that point that in fact you may not know what the chinese are saying through their encrypted devices but you know what the iranians are saying to the chinese and what the chinese also say to them they didn't report back so that gives them it gives it some insight into what the chinese are think you are planning so there's also that i mean one of the things is
7:35 pm
this kind of appalled the german intelligence according to this article is that in the united states there really are no friends in the intelligence community and. everyone so for instance during the falklands war i was in buenos aires covering for national public radio. they could read the argent time device and which was argentina was not a hostile country to the united states especially under the military junta even though they had disappeared $30000.00 of your own citizens which they must have known about. and you know but they fed so they could read the argentine devices and were feeding it to the brits who were sailing towards south georgia and the falkland islands to retake them yet. i want to talk a little bit about the. reach and duration of this global surveillance because it was outside of china and russia it was almost
7:36 pm
everyone. yeah it started in 1070 i think is the start date for that was from the 1970 s. they're really recent times so it's quite a quite a bit of coverage so how would you compare it to the revelations of snowden did we have greater access at least according to those revelations than we did then i think doubt we do yes because of the internet the because the internet and the reach of the internet and the people who are communicating on the internet yeah we have great much greater reach in terms of people access to countries and so on because they've implanted you know device hardware and software in switches and servers and and that works and computers around the world i mean at one point snowden some of the stowed material said they had over 50000 implants in the world wide network so so you think that from at least one node released the reach is actually greater yes i do. to what extent do you
7:37 pm
coming out of the intelligence community do you feel there is i mean let's talk about argentina so during the dirty war dissidents trade union leaders student activists communists mountain arrows they were all swept up and killed by the in order to try and hunt the by the military dictatorship. and yet we stood by and did nothing. as they. carried out one of the most egregious human and later of course or earlier we had seen pinochet in $73.00 which again they must've known completely about to what extent do you feel there's a responsibility to step in moments like that or is is essentially these people we're talking about probably tens of thousands of people are these people just going to be sacrificed for our national self-interest well i always maintain
7:38 pm
that intelligence has to at least stand up for human human really human rights worldwide and. they can do that in ways that will not compromise this sources and methods that they're using that they're not they're not actually trying to do that that's that's the real problem that they have the capacity to do it they have the capability to do it without compromising what their sources are so why aren't they doing it i just don't understand that i mean there's a there's an awful duplicity so i mean i covered the wars in central america whatever the murderous rampages were and el salvador they were dwarfed by real smart of what i'm all and so on the one hand you have through. intelligence gathering very hard evidence 3 of. egregious you know rights violations and yet this intelligence is sitting on your desk in the oval office or anywhere else u.s. policy seeks to mask that evidence that it has i mean often frankly denies
7:39 pm
it in order to support regimes i mean really would be a good one the shah would be another yes yeah i guess. we have sold out human rights and around the world not just for you know for regimes that will support us worldwide but also for other regimes that perhaps we we think need to be changed just for the for the see if they can get something better they have an opportunity to. maybe institute another change for example ukraine is a good one ukraine it we tried to get that regime change too to be a positive one for us and yachts was our guy i think was the key statement at that point so it's the same thing we attempted coup there just like there was a coup attempt here right here trying to get so you see intelligence agencies doing it in both cases one of the things that came up in the series that was kind of interesting is that they would say and a lot of the workers was based in switzerland they didn't know and the workers who
7:40 pm
figured it out were gotten rid of pretty quick right there was a woman they talk about kind of figured all those things. but they would send them into these countries to repair these machines to centrally c.i. a. machine that was a case of somebody one of these poor. technicians who arrived in iran and the iranians had figured it out yeah well i mean that's their whole point they don't they don't consider the implications of it or the. necessarily the threats that might come to employees that they employ unwittingly who have no idea what what is really the background of the company they're working for or what their motives are what they're really doing i mean it's just like it's just like the congress here doesn't really know what the intelligence agencies are doing even in our country right so you know it's no different in this is a problem with intelligence agencies and we need somehow to fix that we had proposed to fix you know to president obama in 2014 but he didn't take it up i mean
7:41 pm
it was to have. a technical group to be able to go around any agency look at any database of any system they had to be able to verify what they're really doing because right now they can't do that even today let's talk because you design systems yes. one of the things i talk about in the in the article is this the evolution of from literally cranks my father is you know in. so there was a cryptographer in world war 2 and they would carry the use kind of very devices strapped to their legs. which could be the germans could break down the american but it took them a few hours right and this was true in the kind of a tactical thing right sort of was by the time they broke it down it was useless because they already moved but there is this evolution within the system. and by the end in a way technology. outpaces always you know you know the ability of
7:42 pm
even this great. enterprise that they've set up itself talk about that evolution well it's a part even to say they face that problem in the late eighty's early ninety's when the digital explosion was starting they they were behind the let me just interrupt because they talk about you know the sixty's even earlier electronic circuits sure going from vacuum tubes the circuits so there were any technology is advanced but you know allowed greater capabilities and greater greater challenges really to the intelligence community so they had to try to keep up with it it was really the digital explosion was really the biggest one that i experience when i was going to come back to that ok when we come back we'll continue our conversation about the cia's encryption services with william binney.
7:43 pm
seemed wrong. just. to see. just. answer. and in. the trail. find themselves well it's a part. of the common ground. has changed american lives but pharmaceutical companies have a miraculous solution. based drugs to people who are chronic pain and believe that their opioid prescription is working for them in the remedy be certain to. price at the. close of dependency in the addiction to opiates the long term use that really isn't scientifically justified and i'll study actually suggest that. the long term effects might not just be absence of benefit but actually that very night because
7:44 pm
we want to. stop a man who has it in plan a change on the last turn to continue a little spike that's simply a in association with management on that end desire to know. how much older than herself a vocal just do not go near them she still. feels to me up on the show was still a lot. looser more pushing and huge for. you but it's not just on thoughts almost unusable not on one level so there's 2 more stuff and it takes 2 to 3 shit when i see you over. and her.
7:45 pm
welcome back to on contact we continue our conversation about the cia's encryption services with bill bennett so before the break we talked about that shift to electronic circuits and then take us from there well from there basically went from the analog no. major shifts from analog to digital in my experience that's what that's what i was in and i say at the time but you know it's the same thing it really was you were looking at the networks back in the dog days and it was simply they shifted to digital so you could really use the same techniques and approaches to solve problems in the digital world that you did in the analytic or in the analog world but many people thought oh it's totally different you know and you have to have new people and young people and they lost that skill to be able to make that transition. with the underlying principles of analysis of data period i
7:46 pm
did what one of the things that interests me is that that shift. from in the mid sixty's. with electronics actually made it easier. because and actually if you think about it as the the internet makes it a lot easier now too because once you solve the system you solve that for the world because it's a standard you know once you get through the standard you you have you have the entire world that your feet you know you can do anything you want to do with it that's why they're being so successful with this reach through across the internet with the 5 eyes and roughly 9 other countries i think that are participating with them in this bulk acquisition of data around the world it does lend some credibility to the fear about why wait and then oh yeah oh well well i've jab my meatball away just to have it all in playing on every deployment you have your you have your own network see that's exactly the 3 that what they want to do is prevent china from having the same thing that we did to the world so that's all. to what
7:47 pm
extent do you just get overwhelmed with too much data well i see that that was the problem even in the 1990 s. that's why we did the thin thread program inside is a huge sign of well i had a good hand at it yeah i did that cath ed loomis did the front half which was acquiring data and i did the back half managing the data but the whole idea was even back then i mean the analysts were making pulls on their data even with the really. minor collection of the internet that they had at that time it was still overloading the adults i mean they get 125-0000 items every day for they'd sit there and they'd start going through and come across something had to report the stop to the report and come back to it that never made it through the entire day's data next day a whole new set of data comes back in same thing again so the whole idea was how to how to filter filter and how to look into the data without actually having to look at the figure out what's important. for the animals to look at and that's exactly what we designed in the thin thread and that meant you could have privacy and
7:48 pm
security at the same time that was a lie they told from the beginning you had to give up privacy to get security that's been a lie all along and they know that it's just that it didn't it didn't give them power over everybody because they didn't have data on everybody and it didn't give them big a budget to build a big empire because it costs a lot of money to do that so you don't load anime now every which you blew the whistle on for which you paid a pretty hefty price but. you know we're all modern yep. and that's all this information is stored in perpetuity yep and is it just stored in perpetuity the way the old stalinist system was so that when you want something on somebody you just pull the file is that yeah that's that's exactly what director mueller the f.b.i. testified to in the 30 to march of 2011 when he was testifying to the senate judiciary committee on how to stop a future fort hood u.s.
7:49 pm
person becoming radicalized and killing people and he said well he set up this technology database with the with the department of defense where he could with one query go in and get all past e-mails and all future ones as they come in a person well that tells you he's going into the n.s.a. database pulling out all the data they all the e-mails from that person that they've got stored which goes back to at least 2001 and even before that on some selected one so so that and then anything that comes in is an automatic routing to them so it's a matter of any analyst at the f.b.i. without oversight by the way going into the n.s.a. data pulling out all this information on anyone and anyone they want to target well we know from you know the f.b.i. and j. edgar hoover and that it's a very easily leaches over into a way to blackmail and and. stroy in the lives of dissidents that's what cohen tell
7:50 pm
pro was right. and these were any war activists peace activists civil rights act was part of their king himself was a victim of this but that we raise this to a whole new level yet at the time that was the same 3 agencies n.s.a. f.b.i. and cia n.s.a. had a program called minaret that parallel the cointelpro and chaos was a parallel at cia put the same 3 agencies today doing the same thing but on a much larger more more comprehensive scale and one of the things that we know you go back and look at the 154 arbenz cuckoo is that they often will because some intelligence services are separated between operations and intelligence were not so this intelligence becomes actionable in terms of carrying out dirty tricks. i mean it gives you leverage moments once you know everybody and what they're doing what they're thinking what they're planning i mean you have the opportunity to manipulate them any way you want causing certain things to occur or
7:51 pm
making certain suggestions in certain areas or you know just simply blackmail against them or anything you can leverage against them or anything that they against somebody they really care about so you have an opportunity to do all of that where do you think we're headed i often wonder if we're all going to the weavers one day i mean the chinese they're part of a couple steps ahead but we're certainly moving in that direction yeah especially with things like the internet of things and also it gives them the opportunity to do any kind of things like using existing kinds of weapons to to like the cubans did in our embassy or the russians did with microwaves in our embassy in moscow they could do the same thing here with other people and we have some people complaining that's in fact what is happening so explain what the microwave so how it works what it will do is give you a. certain microwaves frequencies coming at you will burn your skin and actually
7:52 pm
burn it down to a certain depth and it goes through walls. and it can yes it can go through walls but they also have you know other kinds of laser type things that can be even more intense so they can use infrared to find out where you are and follow you inside your building those kinds of things you know well we all we all carry our own tracking device yes with the phone we're going to say we paid we pay for the privilege yes we do and we pay pay also the for them to spy on us so you have but with the weaker is you've got all this facial recognition technology. many of these i.e. companies come out of silicon valley is that where you have the only yeah and i see it because the n.s.a. there's a program called treasure map that programs intent is to track every device on the network worldwide every minute of every day where it is so that's using g.p.s.
7:53 pm
for your cell phones and computers and so on but also you can marry that up with all the cameras that exist in the world and if you could tap into them you can see where somebody is and get their face from that picture and if you have locations that you have video on for at least 333 different videos you can find the common face in that case that i mean because you can get down to a foot or 2 so and that point you can then start mapping all the faces with all the data you have against that person that the phone numbers and computers numbers and so on and so that then and then get all the other devices feeding you from the internet of things if you will and you get to see everything around that person you can't turn off we think we can turn off our can only get you know it's right and it may look like it off but it's not off that's right that's right what kind of a world are we creating i mean there is no oversight there is no control this is secret government. whatever you think about trump there is a deep state this is it the few times. legislative.
7:54 pm
the legislative body like feinstein have tried to boy they got they came for her. i mean there doesn't seem to be any control at this point yeah and that's what we've been whistleblowers been arguing about that that all of this needs to come under control we tried to make a suggestion to government as to how to do that but it needs to be i mean we really need to have some people held accountable legally and in criminal court for the actions they've done so far before if we don't do that then this thing is just going to continue i mean we have to hold them accountable in criminal court and put them in jail really for well one of the crimes they one of the things that i find fascinating you have figures like clapper brennan former high intelligence officials who for whatever you think about trump. have mounted a public campaign on behalf of the type of intelligence community they moved into and a political assault machine yeah against the white house and one hass to
7:55 pm
suspect that they are speaking on behalf of these organizations well there's another whistleblower coming out i don't know if you have not too much attention is paid to it he ran a program called the hammer out of cia that was set up by clapper and brennan according to the whistleblower and the primary target for that was the trump campaign and even trump before the campaign as well as the president after the campaign so. this was set up separately so that the they could do from cia inside cia so that they could do it and get away with it without having any record in any other agency of the government. so this was a secret set separate program set up by cia clapper in britain to set to do this kind of thing this is what the whistleblower saying well i mean that in the languages i mean they call calling. an agent or.
7:56 pm
a stooge of of moscow a traitor i think they've you know these kinds of words. an aside it doesn't matter what you think of trump and i'm a true critic but that kind of power unleashed within the society is is frightening and despotic and just look at them coming out in the open and saying these kinds of things shows the arrogance of the power they think they have and that's why they have to be held accountable because they aren't i mean this this kind of activity simply continue while they're not not only are they not held accountable but they become. j. edgar hoover on steroids or robbery or any other and essentially they control the state because anybody even in the system of power defies them at tremendous risk they do yes and you can see that with bar in durham now they're being attacked so the idea is that they're trying to get the truth in these this secret government
7:57 pm
doesn't want that because they'll be exposed and once they when they start being exposed and it's going to be like dominoes are going to fall one after the other and then that breaks up the entire state and that's really what we have to do otherwise we're never going to stop this is only going to get worse and what will the state look like is it orwellian at that point it is well i mean we're pretty close that you know. and what do they want i mean what is their goal is it just complete control on behalf of the global elite i don't want to simplify it but what is normal i think that's pretty close to i think it's just the power and control the populations population control and that's because of course with social inequality the stripping of civil and labor rights you are dividing industrial nations into tiny cabal of elites and serfs and that's happening around the world right thanks bill. that was intelligence expert and n.s.a.
7:58 pm
8:00 pm
live from the world headquarters of the r.t. america in our nation's capital this is the news with rick sanchez. our buddy i'm rick sanchez and i want to welcome those of you who are watching us on portable t.v. or on your regular providers from all over the world india in the news today again the country's 1300000000 people are being told their economic lockdown is going to be extended because the coronavirus numbers there are still getting much worse with each passing day we're going to share with you the eerie scenes coming out of india where animals some wild and some not so wild are roaming the.
41 Views
Uploaded by TV Archive on
![](http://athena.archive.org/0.gif?kind=track_js&track_js_case=control&cache_bust=685079315)