Saturday, September 18, 2021

how AI crashed American security system: Most Hellfires not aimed at target but his/her cell phone

9-16-21   “significant secondary explosions from the targeted vehicle indicated the presence of a substantial amount of explosive material [in the car]”.  “The procedures were correctly followed, and it was a righteous strike,” a confidently lying General Milley told the press.  “US military forces conducted a self-defence unmanned over-the-horizon air strike today on a vehicle in Kabul eliminating an imminent ISIS-K (ISKP) threat to the Hamid Karzai International Airport,” said the US Central Command. …

  Three weapons experts told the NYT that “the damage was consistent with the impact of a Hellfire missile” (from drone) and there was no “evidence of the large secondary explosions described by the Pentagon.  No collapsed or blown-out walls, including next to the trunk with the alleged explosives.  No destroyed vegetation”. …

  Most Hellfires (missiles from drones) are not aimed at the target but his/her cell phone with the SIM card providing the location.  Therefore the probability of killing someone else other than the intended target depending on the cell phone’s location is dangerously high….

  The Drone Papers, a leak of classified Pentagon papers published by the award-winning news organisation The Intercept in October 2015, revealed that 90% of the 155 people killed in northeastern Afghanistan by American UAVs in May-September 2015 were EKIA, or wrong targets….Between 2010 and 2020, US drones killed 8,858-16,901 people, including 910-2,200 civilians and 283-454 children, in minimum 14,040 strikes in Pakistan, Afghanistan, Yemen and Somalia.   https://timesofindia.indiatimes.com/blogs/words-worth/poor-intel-droned-kabul-drone-strike/

……………………....................................................

  A SIM card contains a unique serial number (ICCID), international mobile subscriber identity (IMSI) number, security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to, and two passwords: a personal identification number (PIN) for ordinary use, and a personal unblocking key (PUK) for PIN unlocking.  https://en.wikipedia.org/wiki/SIM_card

………………………….......................................

  A Human Rights Watch report into the same CIA-backed strike force units in 2019 had also documented a string of brutalities carried out by the militias over the previous year, including extrajudicial executions of women and young children.  The report highlighted the close role that CIA and U.S. special forces troops played in supporting these units, stating that the strike forces “largely have been recruited, trained, equipped and overseen by the CIA” and “often have US special forces personnel deployed alongside them during kill-or-capture operations; these US forces, primarily Army Rangers, have been seconded to the CIA.” ….

  A Human Rights Watch report into the same CIA-backed strike force units in 2019 had also documented a string of brutalities carried out by the militias over the previous year, including extrajudicial executions of women and young children.  The report highlighted the close role that CIA and U.S. special forces troops played in supporting these units, stating that the strike forces “largely have been recruited, trained, equipped and overseen by the CIA” and “often have US special forces personnel deployed alongside them during kill-or-capture operations; these US forces, primarily Army Rangers, have been seconded to the CIA.” 

ued to carry out atrocities in Afghanistan, including summary executions and torture of civilians.  These acts alienated locals and even some Afghan government officials who criticized the brutal and seemingly indiscriminate manner in which they operated. The Taliban for their part claimed that the killings were helping bring more local support to the insurgency which had coalesced around a shared hatred of the Afghan central government, its security forces and their foreign allies….

  Prior to its role in Afghanistan, the CIA already had a well-documented history of running proxy forces who carried out crimes against humanity in Vietnam, Laos and Central America to name a few ugly episodes from its past.    https://theintercept.com/2021/08/26/afghanistan-cia-war-crimes/

………………………………………………………………………..


A SIMON IoT navigation SIM card will allow you to fly and track your drone farther than ever before.  https://www.simoniot.com/drone-sim-card/

............

7-22-2013  By September 2004 a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this “The Find,” and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit.

At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory.  https://www.fastcompany.com/3014675/how-the-cia-can-send-a-drone-after-any-mobile-phone

No comments:

Post a Comment