Ukrainian PS752 Mystery Solved: Shot Down by Israel’s Unit 8200? [VIDEO]

Pam Barker | Director of TLB Europe Reloaded Project

There is a predictably well-informed and comprehensive level of thinking going on here, as demonstrated by the video conversation between Kevin Barrett and Ian Greenhalgh of Veterans Today below, and Jeremy Rothe-Kushel’s article. We must emphasize, however, that involvement of Israel’s Unit 8200 in the downing of the Ukraine flight PS752 by Iran is purely speculativebut entirely possible, perhaps even probable, as Rothe-Kushel explains.  So – what is Unit 8200?
.

UNIT 8200

First, Wikipedia for a technical, ‘official’ explanation:

Unit 8200 (Hebrewיחידה 8200‎, Yehida shmonae -Matayim– “Unit eight – two hundred”) is an Israeli Intelligence Corps unit responsible for collecting signal intelligence (SIGINT) and code decryption. Military publications include references to Unit 8200 as the Central Collection Unit of the Intelligence Corps … The unit is composed primarily of 18–21 year olds. As a result of the youth of the soldiers in the unit, and the shortness of their service period, the unit relies on selecting recruits with the ability for rapid adaptation and speedy learning.[2] … Former Unit 8200 soldiers have, after completing their military service, gone on to founding and occupying top positions in many international IT companies and in Silicon Valley.[4][5]

According to the Director of Military Sciences at the Royal United Services Institute, “Unit 8200 is probably the foremost technical intelligence agency in the world and stands on a par with the NSA in everything except scale.”[6]

For a real-world example of Unit 8200’s relevance, it has cropped up in in-depth reports linked to Jeffrey Epstein. We offer an extensive quote from one of Whitney Webb’s impressive articles on Epstein (How the CIA, Mossad and “the Epstein Network” are Exploiting Mass Shootings to Create an Orwellian Nightmare). Carbyne is a company that Epstein gave substantial funding to, along with buddy and former Israeli PM (1999-2001) Ehud Barak:

Carbyne911, or simply Carbyne, develops call-handling and identification capabilities for emergency response services in countries around the world, including the United States, where it has already been implemented in several U.S. counties and has partnered with major U.S. tech companies like Google. It specifically markets its product as a way of mitigating mass shootings in the United States without having to change existing U.S. gun laws.

Yet, Carbyne is no ordinary tech company, as it is deeply connected to the elite Israeli military intelligence division, Unit 8200, whose “alumni” often go on to create tech companies — Carbyne among them — that frequently maintain their ties to Israeli intelligence and, according to Israeli media reports and former employees, often “blur the line” between their service to Israel’s defense/intelligence apparatus and their commercial activity. As this report will reveal, Carbyne is but one of several Israeli tech companies marketing themselves as a technological solution to mass shootings that has direct ties to Israeli intelligence agencies.

In each case, these companies’ products are built in such a way that they can easily be used to illegally surveil the governments, institutions and civilians that use them, a troubling fact given Unit 8200’s documented prowess in surveillance as a means of obtaining blackmail and Israel’s history of using tech companies to aggressively spy on the U.S. government. This is further compounded by the fact that Unit 8200-linked tech companies have previously received U.S. government contracts to place “backdoors” into the U.S.’ entire telecommunications system as well as into the popular products of major American tech companies including Google, Microsoft and Facebook, many of whose key managers and executives are now former Unit 8200 officers.

Israeli Prime Minister Benjamin Netanyahu has made it no secret that placing Unit 8200 members in top positions in multinational tech companies is a “deliberate policy” meant to ensure Israel’s role as the dominant global “cyber power”, while also combating non-violent boycott movements targeting Israel’s violations of international law and stifling the United Nations’ criticisms of Israeli government policy and military operations abroad.

We draw attention to the phrase in the last paragraph “multinational tech companies”, which suggests global reach; it also quite obviously suggests infiltration. The extract focuses on US telecommunications as being the target group for back-door software surveillance. Other reports by Webb, however, point to other areas of infiltration through bugged software, such as the financial sector. Mossad asset Robert Maxwell had been marketing Promis software (also a Carbyne product; it is worth mentioning that Trump associate Peter Thiel is an investor in Carbyne) in the 80’s and 90’s, sold to some of the world’s most famous banks and clearinghouses (see Webb’s piece here) for espionage purposes on behalf of the US (NSA) and Israel, both of which had bugs in the software to track money flows.

So the question is begged: which sectors – globally – are off-limits for bugging and surveillance by Israeli intelligence, i.e. are ANY? And what about cyber attacks?

See the Wikipedia entry for Stuxnet, Israeli-designed malware that has been used to surveil and sabotage the production of Iran’s nuclear centrifuges, which it is allowed to produce under the terms of the JCPOA.

For additional information on Unit 8200 and its cyberwarfare activities aimed at influencing public opinion on the internet regarding such causes as the BDS movement, we urge readers to check out this Unit 8200 category of articles at the Electronic Intifada site. See also The History and Impact of #UNIT8200 on Israeli High-Tech Entrepreneurship by Nick Spero for Renegade Tribune from 2017, although, predictably, the videos in this article are no longer available as the site has been deplatformed by Youtube. For the unit’s insidious activities within Palestine, see this piece by Mondoweiss titled Military spying unit to enter Israeli high school curriculums in search of recruits.

 ********

Ukrainian PS752 Mystery Solved: Shot Down by Israel’s Unit 8200?

.
We both agreed that our FFWN colleague Jeremy Rothe-Kushel has offered the most plausible hypothesis explaining how and why the plane was taken down.
.
But as this article goes to press, questions are being raised about the whole shootdown scenario. Stay tuned to VT for updates. –Kevin BarrettVeterans Today Editor
–––

The Prime Suspect in Ukrainian PS752 Shootdown: Israel’s Unit 8200

By Jeremy Rothe-Kushel

Just a couple of hours ago, I heard on the radio an air traffic controller expert who had fairly recently worked in and with Iran, saying that he thought it was very possible that the airline downing, if it were a shootdown as it looks like it was to him, would be due to an “automation” or “software” error not a human one, and it clicked for me:

This was an Israeli cyber terrorist attack that triggered Russian-made Iranian anti-aircraft missile system to misfire against a friendly civilian target by a Unit 8200 backdoor into the “Friend or Foe” ID code, conduited to Israel via Russian technology relations.

The Iranians accused Russia years ago of ‘selling’ the ‘codes’ to Iran’s Russian-supplied anti-aircraft tech to Israel. And it was said that the compromise of the supplied ‘codes’ would allow “Foe” Israeli fighters to confuse Iranian anti-aircraft “Friend or Foe” ID systems to slip through Iranian airspace as “Friends.”

But, of course, the penetrated “Friend or Foe” ID system could be flipped the other way, turning a “Friendly” Ukrainian passenger airliner that just took off into a “Foe” to be shot down, and the system would automate its cyber false-flagged response before human intervention would be feasible, and it could all be tagged to ‘human error.’

Now, the Iranians likely would have made some moves in regards to systems they believed compromised, but the word is in this case from sources in the Israeli press is that it was Russian-made TorM1 missiles that likely took down the plane.

https://www.timesofisrael.com/iranian-missile-likely-downed-ukrainian-flight-near-tehran-us-officials-say/

And chipsets in general, including swaths of military cyber architecture, are largely compromised worldwide. Everybody knows this with US technology, and backdoors and limits designed into US supplied military ballistic hardware. This is likely why Russia and China are now attempting to build national security digital infrastructures that are totally indigenous. But countries like Iran & the US are meanwhile very vulnerable to Israeli tech penetration.

I think in an Israeli context, it was actually about a combination of deterrence (ie. don’t you dare think about launching thousands of missiles at Israeli cities in aggressive response &/or have Hezbollah do that) and further demonization and discrediting of Iran internationally. As opposed to stuxnet, which was US/Israeli joint covert cyber action, with the Israelis upping the ante on aggressiveness & virality, this was likely a unilateral Israeli covert cyber action using its technological relationship via Russia as the conduit, and the USIC as the intel framer/confirmer of Iranian ‘culpability.’

The false flag theory limited hangout will likely be that this was an MEK operation and or mole in place. (ER: MEK is short for the Iranian Mojahedin-e Kalq terrorist group, now residing in Albania, which is known to be John Bolton’s false-flag group of choice to engineer regime change in Iran.)  This is likely much worse than that in its global cyber implications for Iran and beyond. Watch for a Russian lead on the disinformation/cover-up front of the technicals while the Israelis covertly ‘brag’ on the facts to fully air out their act and have it be known by those who they want to know of their willingness to use their cyber power and terroristic ruthlessness.

Iran’s finicky and all-over-the-place response makes me think that this alleged covert terrorist show of Israeli cyber force is exactly what happened. They are likely between a rock and a hard place. They would have to admit ‘culpability,’ while also advancing facts that might publicly disclose that the Israelis likely via a Russian technological conduit have a massive deterrent and, worse, admit a likely compromised Iran to aggressive air attacks.

But if this is true, the Iranians also have the material to end this whole thing with the truth internationally. Zarif has already expressed on twitter that he knows that the truth is what the Trump admin is worried about, and the reason he is being kept out of the US from the UN.  Even compromised US Congress critters like Rand Paul & Mike Lee know that there is something deeply wrong about the Trump regime’s story on ‘Intel’.

Forget the threats of regional proxy military hits and responses. That plays right into Zionist hands, both US & ‘multipolar.’ Expose Israel cyber deception via Russian conduited technology, with US intelligence framing the matter.

The world is sympathetic to the Iranian position right now, in a resonant but altered way to the world’s stance towards the US on 9/11, during which we in the US didn’t fail to seize our Zionist-goaded moment to drive the world tractor of good faith right into our own manure pit of Zionist & MIC treachery for 2 decades, while destroying millions of lives and further poisoning Muslim lands.

The world is ready to forgive an Iranian mistake, even if its ‘mistake’ killed almost 200 people. They did their missile military response flawlessly. Showed their strategic effectiveness, restraint & wisdom, while displaying massive aggressive deterrence towards Israel & US, SA, UAE.

But if this is an Israeli cyber attack against a civilian target, ie. cyber false flag terrorism, and it is exposed as such, this could both put an immediate end to this clear and present aggression, while showing the entire world the danger of Israeli cyber technology domination.

************

Original article

••••

The Liberty Beacon Project is now expanding at a near exponential rate, and for this we are grateful and excited! But we must also be practical. For 7 years we have not asked for any donations, and have built this project with our own funds as we grew. We are now experiencing ever increasing growing pains due to the large number of websites and projects we represent. So we have just installed donation buttons on our websites and ask that you consider this when you visit them. Nothing is too small. We thank you for all your support and your considerations … (TLB)

••••

Comment Policy: As a privately owned web site, we reserve the right to remove comments that contain spam, advertising, vulgarity, threats of violence, racism, or personal/abusive attacks on other users. This also applies to trolling, the use of more than one alias, or just intentional mischief. Enforcement of this policy is at the discretion of this websites administrators. Repeat offenders may be blocked or permanently banned without prior warning.

••••

Disclaimer: TLB websites contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of “fair use” in an effort to advance a better understanding of political, health, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than “fair use” you must request permission from the copyright owner.

••••

Disclaimer: The information and opinions shared are for informational purposes only including, but not limited to, text, graphics, images and other material are not intended as medical advice or instruction. Nothing mentioned is intended to be a substitute for professional medical advice, diagnosis or treatment.

1 Comment on Ukrainian PS752 Mystery Solved: Shot Down by Israel’s Unit 8200? [VIDEO]

Leave a Reply

Your email address will not be published.


*