http://digital-intifada.blogspot.com/2012/04/digital-intifada-exclusive-interview.html

Tuesday, 25 February 2014

WE SAID IT BEFORE WE POST IT AGAIN ERDOGAN AND HiS SON THE ZIONISTS FRIEND GETS EXPOSED FOR WHAT HE IS CORRUPT AND FACIST

In the new voice recording, Erdoğan and his son Bilal allegedly discuss during five wiretapped phone conversations on plans how to hide huge sums of cash on the day when police raided a number of venues as part of a corruption investigation that has implicated sons of three Turkish ministers, businessmen and chief of the state bank. At the beginning of the phone conversation, the prime minister briefs his son Bilal about the raid and asks him to “zero” the amount (at least $1 billion cash) stashed at five houses. The authenticity of the recordings has not been verified.

Hakan Fidan, undersecretary of the Turkish National Intelligence Organization (MIT) was immediately called in prime ministry. Prime ministry office was also published an immediate response, claiming the recording to be a “defile montage” and they will press charges.


After an emergency meeting, Turkish main opposition Republican People’s Party (CHP) has said the Turkish government has lost its legitimacy and called on Turkish Prime Minister to resign immediately after Erdoğan’s voice recording surfaced online.


Translation:


RTE = Recep Tayyip Erdoğan(Prime Minester of Turkey)


BE = Bilal Erdoğan(PM's Son)


RTE: Are you home son?

Bilal E(son): Yes father
RTE: Now! This morning [they] made an operation. Ali Agaoglu, Reza Zerrab, Erdogan’s [Bayraktar-ex minister] son, Zafer’s [Caglayan – ex-minister] son, Muammer’s [Guler – ex-minister] son, etc.. All their houses are being searched now.
BE: Tell again, daddy
RTE: I’m saying that Muammer’s son, Zafer’s son, Erdogan’s son, Ali Agaoglu, Reza Zerrab etc they are searching the houses of 18 people under a big corruption operation thing.
BE: yes
RTE: OK? Now, what I say is, you take everything that you have in the house out. OK?
BE: What can I have on me dad! There is your money in the safe
RTE: That’s what I am saying. Now, I am sending your sister. OK?
BE: You are sending who?
RTE: Your sister, I’m saying.
BE: Eh, OK
RTE: Then,… She has that information, OK. Talk with your big brother
BE: Yes
RTE: On him,,, Let’s do…, talk with your uncle too, he should also take out, also talk to your [maternal] uncle, he should also…
BE: What should we do with these daddy, where should we put them?
RTE: To specific places, to some specific places… do it
(A woman’s voice on background saying “Berat”)
BE: Berat also has some
RTE: That’s what I am saying. Now, get together, go get your uncle, I don’t know if Uncle Ziya has some, OK? Also immediately [inform] your brother Burak too.
NE: OK father. You mean Sumeyye, I mean take out, Sumeyye will tell me where to take them?
RTE: Yes, fine. C’mon now, do [it] think about yours among yourselves with your uncle, etc
NE: on what to do?
RTE: Yes, yes, let’s contact fast, until 10.00. Because the issue is…
NE: OK father
RTE: OK? Keep in touch
NE: OK daddy

2nd call 11.17


NE: Father, We got together with Brother Hasan etc. Brother Berat, my uncle, we are together, thinking about it. Berat has another idea. He says that let’s give some of it to Faruk [Kalyoncu] for the other “business/thing” so he can process them like the previous ones. Shall we do it, we can solve a big amount with this.

RTE: That may be
NE: OK. For the other part, because we started a business partnership with Mehmet Gur, we thought of giving it to him saying “keep it, as the projects come you can use from that. This way, we will be able to dissolve and move the rest to somewhere else.
RTE: OK, fine, as long as you do…
NE: OK
RTE: Did Sumeyye arrive?
NE: She arrived home, she’ll now come here. OK daddy, we will sort this out today, inshallah (with God’s permission). Anything else?
RTE: It would be good if you do… If you can dissolve them all.
BE: Yes, we will dissolve them all, inshallah

3rd call 15.39

RTE: Did you do the other tasks I gave you?
BE: We will finish them in the evening. We sorted some out; We sorted the Berat part, now we will first handle the part with Mehmet Gur and the rest, we will do that when it gets dark.
RTE:….
BE: Inshallah
RTE: What did Sumeyye do?
BE: She took them out, brought, we talked, etc.
RTE: Did she sort both sides?
BE: I think so daddy, she said she emptied both.
RTE: Both sides
BE: Yes, she said both of them, but you mean this by saying both sides, right?
RTE: Whatever. OK, fine
BE: What time will you arrive?
RTE: About 12
BE: Have a safe journey
RTE: Do not talk on the phone

4th call 23.15

BE: Hi daddy, I am calling to… we did [it] mostly. Eee, did you call me daddy?
RTE: No I did not, you called me
BE: I was called from a secret number
RTE: By saying mostly, did you fully dissolve it
BE: We did not zeroized it yet daddy. Let me explain.. We still have a 30 million euros that we could not yet dissolve. Berat thought of something.. There was an additional 25 million dollars that Ahmet Calik should receive. They say let’s give this [to him] there. When the money comes, we do [something], they say. And with the remaining money we can buy a flat from Sehrizar, he says. What do you say, father?
RTE: ….
(background soun: Ayyy)
BE: Daddy
RTE: Is Sumeyye with you?
BE: Yes with me, should I call her?
RTE: No, there was another sound, that’s why I asked
BE: Umm.. I mean, he can transfer 35 million dollars to Calik and buy a flat from Sherizar with the remaining.
RTE: Whatever, we will sort it
BE: Should we do it like this?
RTE: OK do it
BE: Do you want them all dissolved father, or do you want some money for yourself
RTE: No, it cannot stay, son. You could transfer that to the other, with Mehmet you could transfer it there…
BE: Yes, we gave to them. We gave 20 to them
RTE: For God’s sake, first you should’ve transferred you could then do…
BE: we were able to give this much for now, it is hard already, it takes too much space. We are putting some of it to another place, we gave part of it to Tunc, and then…
RTE: did you transfer all to Tunc?
BE: (Sumeyye, can you come) Where, father?
RTE: To Tunc, I say, did you transfer all to Tunc?
BE: They asked, I guess he said that he could take 10 million euros.
RTE: Whatever. Do not talk this like this on this.
BE: OK, then, we will sort it as such
RTE: Ok do it. I am not able to come tonight, I will stay in Ankara
BE:OK, we are sorting it out. You do not worry

5th call

18.12.2013 10.58
RTE. I wondered if everything is fine, so I called
BE: No, nothing. We finished the tasks you gave us, with the help of the God
RTE: Is it all zeroed?
BE: Fully, I mean saying zeroed, how should I put it? I had Samandira and Maltepe’s money, 730.000 USD and 300.000 TL. I will handle these too. We owe 1 million TL to Faruk İsik (AKP MP); I will give those to him and tell him to transfer the rest to the academy.
RTE: Do not talk openly
BE: Should’t I talk?
RTE: Do not talk, OK?
BE: OK daddy
RTE: I mean, do not keep anything on you, whatever it is Samandira or whatever… Send it to where it needs to be, where do you keep it?
BE: OK daddy, but I think currently we are under surveillance
RTE: What have I been telling to you since the very beginning!
BE: But is it the bodyguard team? Who is following us father?
RTE: Son, you are being tapped
BE: But they are also visually monitoring, they say
RTE: That may be true. Now, we did some things (meaning intervention) in Istanbul security

Source: http://revolution-news.com/

Read more at http://www.liveleak.com/view?i=dfe_1393312222#uF0rPpYTEzhzCBKT.99








Israel and Turkey, trade ties between the two countries thrived, reaching an all-time high of $4 billion – a 30% up
http://t.co/xcA8cexIN8                           
http://www.ynetnews.com/articles/0,7340,L-4366091,00.html

During the crisis between Israel and Turkey, trade ties between the two countries thrived, reaching an all-time high of $4 billion – a 30% increase.

http://www.marinetraffic.com/ais/shipdetails.aspx?mmsi=271000359

SAFRAN 1 - IMO 9041124 - Callsign TCVF - ShipSpotting.com - Ship Photos and Ship Tracker
www.shipspotting.com

2012 October 20th, 08:00:05 UTC Ashod

Election ‘Milestone’

Erdogan, who turns 60 tomorrow, has blamed the series of crises shaking his government on political rivals and an “interest-rate lobby” seeking to undermine Turkey and its economy. He has accused followers of U.S.-based cleric Fethullah Gulen within the police and judiciary, of bugging his office and taping his conversations with family members to undermine his party before a series of elections. The first test will come during local elections on March 30, a date that Erdogan described as a “milestone.”
“Let’s settle scores at the ballot box,” he told his party’s lawmakers at parliament today. The party “will never share the rule of Turkey with any group,” he said.
The lira weakened as much as 1 percent after the tape was posted late yesterday and extended losses today, falling 0.3 percent to 2.2057 per dollar at 5 p.m. in Istanbul. The currency has lost more than 8 percent since the corruption investigation became public Dec. 17, the worst performance among emerging market currencies in Europe, the Middle East and Africa. The benchmark stock index tumbled 3.4 percent.

Audio Engineers

Kilicdaroglu, the opposition leader, said audio engineers confirmed that the recording of alleged conversations between Erdogan and his son were authentic.
“It really doesn’t matter how true these allegations are,” Atilla Yesilada, an Istanbul-based analyst at economic advisory firm Global Source Partners Inc. “The fact is that the opposition took them to be genuine, calling on the AKP government to resign.”
Abbas Ameli-Renani, a strategist at Royal Bank of Scotland Group Plc, said that judging by Erdogan’s response to the graft probe, his reaction to “the personal allegations will most likely be fierce.”
Shortly before Erdogan spoke, the state-run Anatolia news agency said authorities were probing two prosecutors for allegedly ordering mass bugging. Prosecutors driving the corruption probe that shook the government have been shunted off the case, and thousands of police officers reassigned.
Erdogan called an emergency meeting in his office after the tape was made public. He met chief of intelligence, Hakan Fidan, and Deputy Prime Minister Besir Atalay, according to NTV television.

PYSOPS MADE TO ORDER BY BIG BROTHER

Featured photo - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy ReputationsA page from a GCHQ top secret document prepared by its secretive JTRIG unit
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:
Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:
Then there are the tactics used to destroy companies the agency targets:
GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”
Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.
The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardianin the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.
The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”
Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.
Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?
Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:
Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:
We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?
As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”
These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.
Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Western spy agencies build ‘cyber magicians’ to manipulate online discourse / RIGHT NOW LARGEST PYSOPS UNDER WAY EVER SEEN

Secret units within the 'Five Eyes" global spying network engage in covert online operations that aim to invade, deceive, and control online communities and individuals through the spread of false information and use of ingenious social-science tactics.
Such teams of highly trained professionals have several main objectives, such as “to inject all sorts of false material onto the internet” and “to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable,”The Intercept’s Glenn Greenwald reported based on intelligence documents leaked by former NSA contractor Edward Snowden.
The new information comes via a document from the Joint Threat Research Intelligence Group (JTRIG) of Britain’s Government Communications Headquarters (GCHQ), entitled 'The Art of Deception: Training for Online Covert Operations,' which is top secret and only for dissemination within the Five Eyes intelligence partnership that includes Britain, the US, Australia, Canada, and New Zealand.
Image from firstlook.org
Image from firstlook.org

The document outlines what tactics are used to achieve JTRIG’s main objectives. Among those tactics that seek to “discredit a target” include “false flag operations” (posting material online that is falsely attributed to a target), fake victim blog posts (writing as a victim of a target to disseminate false information), and posting “negative information” wherever pertinent online.
Other discrediting tactics used against individuals include setting a "honey-trap" (using sex to lure targets into compromising situations), changing a target's photo on a social media site, and emailing or texting "colleagues, neighbours, friends etc."
To "discredit a company," GCHQ may "leak confidential information to companies/the press via blog...post negative information on appropriate forums [or] stop deals/ruin business relationships."
JTRIG's ultimate purpose, as defined by GCHQ in the document, is to use "online techniques to make something happen in the real world or cyber world." These online covert actions follow the “4 D's:” deny, disrupt, degrade, deceive.
Image from firstlook.org
Image from firstlook.org

As Greenwald pointed out, the tactics employed by JTRIG are not used for spying on other nations, militaries, or intelligence services, but for “traditional law enforcement” against those merely suspected of crimes. These targets can include members of Anonymous, “hacktivists,” or really any person or entity GCHQ deems worthy of antagonizing.
“[I]t is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption,” Greenwald wrote.
In addition, the targets do not need to have ties to terror activity or pose any national security threat. More likely, targets seem to fall closer to political activists that may have, for instance, used denial of service tactics, popular with Anonymous and hacktivists, which usually do only a limited amount of damage to a target.
Image from firstlook.org
Image from firstlook.org

“These surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats,”Greenwald wrote.
In addition to the personal attacks on targets, JTRIG also involves the use of psychological and social-science tactics to steer online activism and discourse. The document details GCHQ’s “Human Science Operations Cell,” which focuses on “online human intelligence” and “strategic influence and disruption”that are used to dissect how targets can be manipulated using “leaders,” “trust,” “obedience,” and“compliance.”
Using tested manipulation tactics, JTRIG attempts to influence discourse and ultimately sow discord through deception.
When reached for comment by The Intercept, GCHQ avoided answering pointed questions on JTRIG while insisting its methods were legal.
“It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position,” GCHQ stated.



Image from firstlook.org