Those Making Decisions About Destiny

Spooky and deviant people packaged in philanthropic paper and bows have darker missions that is not conspiracy but fact.

The Clinton Foundation is not especially included in this group but the same model of collusion is applied.

Going back to 2009, the agenda was being crafted for the next four years and had a probability of the next eight to ten years. It is working and chilling.

Note, they even call themselves the ‘Good Club’….really?

They’re called the Good Club – and they want to save the world
Paul Harris in New York reports on the small, elite group of billionaire philanthropists who met recently to discuss solving the planet’s problems
It is the most elite club in the world. Ordinary people need not apply. Indeed there is no way to ask to join. You simply have to be very, very rich and very, very generous. On a global scale.

This is the Good Club, the name given to the tiny global elite of billionaire philanthropists who recently held their first and highly secretive meeting in the heart of New York City.

The names of some of the members are familiar figures: Bill Gates, George Soros, Warren Buffett, Oprah Winfrey, David Rockefeller and Ted Turner. But there are others, too, like business giants Eli and Edythe Broad, who are equally wealthy but less well known. All told, its members are worth $125bn.

The meeting – called by Gates, Buffett and Rockefeller – was held in response to the global economic downturn and the numerous health and environmental crises that are plaguing the globe. It was, in some ways, a summit to save the world.

No wonder that when news of the secret meeting leaked, via the seemingly unusual source of an Irish-American website, it sent shock waves through the worlds of philanthropy, development aid and even diplomacy. “It is really unprecedented. It is the first time a group of donors of this level of wealth has met like that behind closed doors in what is in essence a billionaires’ club,” said Ian Wilhelm, senior writer at the Chronicle of Philanthropy magazine.

The existence of the Good Club has struck many as a two-edged sword. On one hand, they represent a new golden age of philanthropy, harking back to the early 20th century when the likes of Rockefeller, Vanderbilt and Carnegie became famous for their good works. Yet the reach and power of the Good Club are truly new. Its members control vast wealth – and with that wealth comes huge power that could reshape nations according to their will. Few doubt the good intentions of Gates and Winfrey and their kind. They have already improved the lives of millions of poor people across the developing world. But can the richest people on earth actually save the planet?

The President’s House of Rockefeller University is on the Upper East Side of Manhattan. The university’s private campus, full of lush green trees, lies behind guarded entrances and a metal fence. It overlooks the East River, only a few blocks away from the United Nations.
It was here, at 3pm on 5 May, that the Good Club gathered. The university’s chancellor, Sir Paul Nurse, was out of town but, at the request of David Rockefeller, had allowed the club to meet at his plush official residence. The president’s house is frequently used for university events, but rarely can it have played host to such a powerful conclave. “The fact that they pulled this off, meeting in the middle of New York City, is just absolutely amazing,” said Niall O’Dowd, an Irish journalist who broke the story on the website irishcentral.com.

For six hours, the assembled billionaires discussed the crises facing the world. Each was allowed to speak for 15 minutes. The topics focused on education, emergency relief, government reform, the expected depth of the economic crisis and global health issues such as overpopulation and disease. One of the themes was new ways to get ordinary people to donate small amounts to global issues. Sources say Gates was the most impressive speaker, while Turner was the most outspoken. “He tried to dominate, which I think annoyed some of the others,” said one source. Winfrey, meanwhile, was said to have been in a contemplative, listening mood.

That the group should have met at all is indicative of the radical ways in which philanthropy has changed over the past two decades. The main force behind that change is Gates and his decision to donate almost all his fortune to bettering the world. Unlike the great philanthropists of former ages, Gates is young enough and active enough to take a full hands-on role in his philanthropy and craft it after his own ideas. That example has been followed by others, most notably Soros, Turner and Buffett. Indeed, this new form of philanthropy, where retired elite businessmen try to change the world, has even been dubbed “Billanthropy” after Gates. Another description is “philanthro-capitalism”. Much more here.

Examples:

Bill and Melinda Gates Foundation grants money to measure your child’s moods via bracelets. Reported by the Chicago Tribune, schools are the basis of the testing and database modeling, where behavior modification is the sole objective.

Warren Buffett’s Foundation has an initiative controlling water and the food supply in Africa and Central America, all in the cause of enhancing agriculture to which population control and sustainability is achieved. To date, Central America is full of bloody criminals and Africa is a continent rife with terror. Buffett is a large funder of abortions globally.

George Soros, the spookiest of the Good Club, has an umbrella organization titled Open Society Institute that funds just about every dark nefarious operation globally, even the IRS scandal, suppressing free speech.

Ted Turner, the media mogul has a ‘one child’ policy emulating that of China.

It appears all of these members of the ‘Good Club’ continue discussion from a 1974 USAID study. Further as the decades pass with new trends emerging, more aggressive and edited objectives are financed.

The matter of eradicated diseases re-emerging, refugees and global financial strife has wrought other billionaires missions yet to be fully realized or understood but take caution.

 

 

Per FBI: Foreign Telecoms Likely Hacked Hillary Emails

The Justice Department officials also used the words “reckless”, “stunning,” and “unbelievable” in discussing the controversy swirling around Clinton’s use of a private, nongovernment email account.

FBN Exclusive: DOJ Officials Fear Foreign Telecoms Hacked Clinton Emails, Server

FBN: Officials close to the matter at the Department of Justice are concerned the emails Hillary Clinton sent from her personal devices while overseas on business as U.S. Secretary of State were breached by foreign telecoms in the countries she visited—a list which includes China.

“Her emails could have easily been hacked into by telecoms in these countries. They got the emails first, and then routed them back to her home server. They could have hacked into both,” one Justice Department official close to the matter says.

Another Justice Department official adds: “Those telecommunications companies over there often have government workers in there. That telecom in that foreign country could then follow the trail of emails back to her server in the U.S. and break into the server” remotely over the Internet. At various points in this process, there were multiple entry points to hack into Clinton’s server to steal information, as well as eavesdrop, the Justice Department officials say.

This is the first indication that officials at the Justice Department are concerned that foreign telecom workers may have broken into Clinton’s emails and home server. The Federal Bureau of Investigation is currently investigating the national security issues surrounding Clinton’s emails and server.

The Justice Department officials also used the words “reckless”, “stunning,” and “unbelievable” in discussing the controversy swirling around Clinton’s use of a private, nongovernment email account, as well as her use of a personal Blackberry (BBRY), an Apple (AAPL) iPad, and home server while U.S. Secretary of State. The officials did not indicate they have any knowledge of a breach at this point.

As for the effort to designate Clinton’s emails as classified or unclassified, the Justice Department officials agreed that, as one put it: “Every email she sent is classified because she herself is classified, because she is both Secretary of State and a former first lady.”

In addition, there’s a growing belief among cyber security experts at web security places like Venafi and Data Clone Labs that Clinton’s emails were unprotected in the first three months of her tenure in 2009 as the nation’s top diplomat, based on Internet scans of her server Venafi conducted at that time.

“For the first three months of Secretary Clinton’s term in office, from early January to late March, access to her home server was not encrypted or authenticated with a digital certificate,” Kevin Bocek, vice president of security strategy and threat intelligence at Venafi tells FOX Business. “That opens the risk that Clinton’s user name and password were exposed and captured, particularly in places she traveled to at this time, like China or Egypt. And that raises issues of national security,” adding “Attackers could have eavesdropped on communications, particularly in places like China, where the Internet and telecom infrastructure are built to do that.”

Digital certificates are the bedrock of Internet security. They verify the Web authenticity and legitimacy of an email server, and they let the recipient of an email know that an email is from a trusted source. Essentially, digital certificates are electronic passports attached to an email that verifies that a user sending an email is who he or she claims to be.

Because it appears Clinton’s server did not have a digital certificate in the first three months of 2009, “a direct attack on her server was likely at this time, and the odds are fairly high it was successful,” says Ira Victor, director of the digital forensic practice at Data Clone Labs.

In and around January 13, 2009, the day of Clinton’s Senate confirmation hearings, the clintonemail.com domain name was registered. An estimated 62,320 emails were sent and received on Clinton’s private email account during her tenure as U.S. Secretary of State. Later, 31,830 emails were erased from her private server because they were deemed personal.

Although Clinton previously has argued that there was no classified material on her home server in Chappaqua, N.Y., the U.S. Department of State has deemed 403 emails as classified, with three designated “top secret” (the State Dept. itself has been the subject of cyber hacking).

Clinton has maintained her home server did have “numerous safeguards,” but it’s unclear specifically what security measures were installed, and what those layers were. In September, Clinton apologized on ABC News for using a home server to manage her U.S. Department of State electronic correspondence.

Although Clinton and her team have indicated her emails were not hacked, not knowing about a breach is different from being hacked, cyber analysts tell FOX Business. Her campaign staffers did not return calls or emails for comment. “Even the NSA, the CIA, and Fortune 500 companies know they cannot make that claim that they have not been hacked. Everyone can be hacked,” says Bocek.

FOX News recently reported that an intelligence source familiar with the FBI’s probe into Clinton’s server said that the FBI is now focused on whether there were violations of the federal Espionage Act pertaining to “gross negligence” in the safeguarding of national defense information. Sets of emails released show that Clinton and top aides continuously sent information about foreign governments and sensitive conversations with world leaders, among other things, FOX News reported.

Secure communications and devices are routine in the federal government. For example, President Barack Obama received a secure Blackberry from the National Security Agency after he was elected, a former top NSA official tells FOX Business.

“I could not recall that I ever heard that a secure Blackberry was provided to Hillary Clinton.  No one else can either,” the former NSA official says, adding, “There is no way her calls were properly secured if she used her [personal] Blackberry.” Blackberry declined comment.

The former NSA official says the same issue is at play for Clinton’s iPad. “While there have been recent advances in securing iPhones and iPads, these were not available, in my opinion, when she was Secretary of State and there would have to be a record that she sought permission to use them with encryption,” the former NSA official says.

When traveling overseas, U.S. secretaries of states use secure phones that ensure end-to-end encryption, and in some cases, mutual authentication of the parties calling, the former NSA official said. Communications are conducted via secured satellite, digital networks or Internet telephony.

“I think I can say, with some confidence, that once any decent foreign intelligence service discovered she was using her personal phone and iPad, she would be targeted and it would be a high priority operation,” the former NSA official said, adding, “if the calls were unencrypted, it would be no challenge at all while she was overseas — they just have to get to the nearest cell tower.”

The first three months of her tenure as Secretary of State would have been an ideal time for hackers to break in, cyber security experts say.

Specifically, experts point to work done by cyber security experts at Venafi, which has revealed a three-month gap in security for Clinton’s home server after the Palo Alto, Calif. firm’s team had conducted routine, “non-intrusive Internet scanning” in January 2009.

Venafi’s Bocek tells FOX Business that he and his team had picked up Clinton’s domain, clintonemail.com, at that time, and found that her home server had not been issued a digital certificate. That means email traffic to and from her server was unprotected from early January to late March 2009. During that time, Clinton traveled as U.S. Secretary of State to China, Indonesia, South Korea, Japan, Egypt, Palestine, Israel, Belgium, Switzerland, and Turkey.

“It also means anyone accessing her home server, including Clinton and other people, would have unencrypted access, including from devices and via web browsers,” says Bocek. “This means that during the first three months of Secretary Clinton’s term in office, web browser, smartphone, and tablet communications would not have been encrypted.”

Digital certificates are vital to Internet security. All “online banking, shopping, and confidential government communications wouldn’t be possible without the trust established by digital certificates,” says Bocek. “Computers in airplanes, cars, smartphones, all electronic communications, indeed trade around the world depend on the security from digital certificates.”

The Office of Management and Budget has now mandated that all federal web servers must use digital certificates by the end of 2016, Bocek notes.

If cyber hackers broke into Clinton’s server, they also could have easily tricked it into handing over usernames, passwords, or other sensitive information, Bocek noted.

“The concern is that log-on credentials could have been compromised during this time, especially given travel to China and elsewhere,” Bocek says opening the door to more lapses. “As we’ve seen with so many other breaches, to long-term, under-the-radar compromise by adversaries, hacks that Clinton and her team may not be aware of.”

Bocek adds: “Essentially, the cyber hacker would have looked to Clinton’s server like it was Secretary Clinton emailing.”

Digital forensic analyst Victor agrees. “It’s highly likely her emails sent during this time via her devices and on her server were not encrypted. More significantly, her log-on credentials, her user name and passwords, were almost certainly not encrypted,” says Victor, who has testified in cyber security cases as an expert forensic witness. “So that means emails from Clinton’s aides, like Huma Abedin, or anyone who had email accounts on her server, their communications were also likely unencrypted.”

Victor adds: “It’s highly likely all of their user names and passwords were being exposed on a regular basis to potential cyber attackers, with the high risk they were stolen by, for instance, government employees who could get the passwords for everyone Clinton was communicating with.”

Victor explains how Clinton’s emails from her devices could have been hacked, and malware could have been planted on her server. “Say Clinton emailed from her device during her Beijing trip in that 2009 period. Her emails would first get routed through the local, state-controlled Chinese telecom. The Chinese telecom captures those bits of emails that are broken up into electronic packets by the device she uses,” Victor explains.

Any device Clinton emailed from, Victor says, was constantly “polling and authenticating communications” between her device and her server. But all of the back-and-forth communication goes through, say, the Chinese telecom. When the device is polling her server with non-secure communications, it’s giving attackers repeat opportunities to breach.”

He continues: “If the connection was not protected, a state actor at the China telecom transmitting her email back to her server in the U.S. could breach both the device and the server at that point.”

Martin C. Libicki, a senior management scientist and cyber expert at Rand Corp., says that security on Clinton’s devices could have been higher than feared. But he says that, while the Blackberry device does have strong encryption, once Clinton zoomed emails from her Blackberry through the foreign telecom networks during those first three months of her tenure, “it was much easier to hack both the device and the server then.”

Venafi’s team, which included analysts Hari Nair and Gavin Hill, found Clinton and/or her team did eventually purchase digital certificates for the server and the clintonemail.com domain name starting in March 2009.

Victor added: “But the question that needed to be asked then was, once the certificate was installed, did Clinton and her team warn anyone she had emailed during those first three months about the poor security during that time, did they warn them to reset their security passwords on all their devices?”

FBI Director Comey: The Ferguson Effect

FBI Director James Comey has visited several law enforcement agencies across the country to determine the ‘chill’ by law enforcement. The White House pushed back hard as did Amnesty International. Chicago Mayor Rahm Emanuel and former White House Chief of Staff even declared his police force in Chicago is in the fetal position.

The FBI keeps the statistics….

FBI chief again says Ferguson having chilling effect on law enforcement

Twice in recent days, FBI Director James B. Comey has stepped to a podium here and asserted that police across the nation are reluctant to aggressively enforce the law in the post-Ferguson era of smartphones and YouTube.

And twice his comments have drawn disagreement and derision from a host of sources, including civil rights activists, law enforcement officials and, on Monday, the White House.

“The available evidence at this point does not support the notion that law enforcement officers around the country are shying away from fulfilling their responsibilities,” White House press secretary Josh Earnest said Monday during a news briefing in Washington. “The evidence that we’ve seen so far doesn’t support the contention that law enforcement officials are somehow shirking their responsibility.”

Comey, nonetheless, stayed the course, telling thousands of police officials gathered here for a conference of the International Association of Chiefs of Police that a violent crime wave is gripping the nation’s major cities. And he suggested that police officers themselves are in part to blame, made gun shy by the prospect of getting caught on the next video of alleged police brutality.

The “age of viral videos” has fundamentally altered U.S. policing, Comey said Monday in a speech virtually identical to one he delivered last week at the University of Chicago Law School.

His comments have been interpreted as giving credence to the notion of a “Ferguson effect” — the theory that riots and racial unrest in places such as Ferguson, Mo., and Baltimore, where police were accused of killing civilians, has prompted police officers to become more restrained. That, in turn, has theoretically resulted in an uptick in violent crime, as criminals become emboldened.

Comey acknowledged Monday that he has little evidence to support the theory.

“The question is, are these kinds of things changing police behavior around the country? The honest answer is: I don’t know for sure whether that’s the case,” he said, adding that “I do have a strong sense” that it’s true.

It’s “the one theory that to my mind and to my common sense, does explain” rising rates of urban violence in 2015.

Coming from the nation’s top law enforcement official, the remarks have landed like a bombshell in criminal justice circles, offending people across the political spectrum. Civil rights groups and activists have taken deep exception to the idea that crime rates might be linked to protests against police brutality.

Amnesty International USA executive director Steven Hawkins called Comey’s comments “outrageous” and “unsubstantiated.”

Policing groups, meanwhile, have been equally infuriated by the assertion that their officers have been somehow derelict in their duties, frightened by teenagers with cellphone cameras.

“Time and time again [Comey] generalizes about a segment of the population that he knows nothing about,” said James O. Pasco, executive director of the National Fraternal Order of Police. “He has never been a police officer.”

Comey is “like the scarecrow in the Wizard of Oz,” Pasco said. “He wanders around pretending to be smart and then at the end they give him a diploma and he thinks he’s a genius. They swear him in as the director of the FBI and all of a sudden he’s an expert on what police officers are thinking.”

The speeches have also put Comey at odds with the White House, as President Obama is eager to take credit for lowering the crime rate.

As Comey was preparing to deliver his address Friday, Obama was hosting a criminal-justice forum at the White House, where he celebrated “incredible, historic reductions in crime over the last 20 years.”

“I know that there’s been some talk in the press about spikes that are happening this year relative to last year. I’ve asked my team to look very carefully at it — Attorney General Lynch has pulled together a task force — and it does look like there are a handful of cities where we’re seeing higher-than-normal spikes,” Obama said at the time. However, he added, “across the 93 or 95 top cities, it’s very hard to distinguish anything statistically meaningful.”

In his speech Monday, Comey also urged law enforcement leaders to stop engaging in an us-vs.- them tug of war with protesters from Black Lives Matter, the group that sprung up in the wake of the August 2014 shooting of a black teenager by a white police officer in Ferguson, Mo.

Instead, Comey said, police chiefs should use the budding protest movement as a window into the minds of those they are charged with protecting.

“There is a line of law enforcement and a line of communities we serve, especially communities of color,” Comey said. “Each time somebody interprets ‘hashtag Black Lives Matter’ as anti-law enforcement, one line moves away. And each time someone interprets ‘hashtag police lives matter’ as anti-black, the other line moves away.”

Comey’s comments come weeks after he held a closed-door session with 100 city leaders and law enforcement officials from across the nation. At that meeting, many — including Chicago Mayor Rahm Emanuel (D) — reported that police morale was sinking in their towns amid ongoing scrutiny.

“We have allowed our police department to get fetal, and it is having a direct consequence,” Emanuel declared during the meeting. “They have pulled back from the ability to interdict . . . they don’t want to be a news story themselves, they don’t want their career ended early, and it’s having an impact.”

Comey said such feedback has served as inspiration for his recent speeches, in which he declared that violent crime rates are being inflated by a “a chill wind blowing through American law enforcement over the last year.”

“That wind is surely changing behavior,” Comey said, later adding: “We need to figure out what’s happening and deal with it now. I refuse to wait . . . these aren’t data points, these are lives.”

Govt Warns: Raise Your Shield

When one considers all the major hacking events including the Office of Personnel Management, this is truly a warning.

Sounds like they are telling us we are on our own but the advise is good and must be heeded.

NEWS RELEASE

National Counterintelligence and Security Center
Releases Social Media Deception Awareness Videos

Videos are second in a series released in the wake of the OPM records breach
FOR IMMEDIATE RELEASE                                                                      
ODNI News Release No. 21-15
October 23, 2015

Today the ODNI’s National Counterintelligence and Security Center released the second in a four-part series of videos from its “Know the Risk—Raise Your Shield” campaign.

The latest campaign videos focus on social media deception, and are intended to help build public awareness of the inherent dangers that the use of social media—Facebook, Twitter, etc.—could present when appropriate protective measures are not taken.  There are two videos: a shorter attention-grabber and a second longer video which provides details about social media deception, how government officials or the public can recognize threats and what steps can be taken to minimize the risk of being deceived.

“The information the social media deception videos and overall campaign convey will increase individuals’ awareness of the dangers in cyberspace and provide common-sense tools to protect themselves from bad actors, be they criminals or foreign intelligence entities,” said NCSC Director Bill Evanina.

The NCSC launched the campaign last month in the wake of the Office of Personnel Management records breach to help those individuals, government or otherwise, whose personal information has been compromised.  The launch videos focused on “Spear Phishing Attacks,” while the final sets of videos—to be released in November and December, respectively—will focus on human targeting and awareness for travelers.  Each release contains a 30-45-second overview video and a more in-depth two minute video.

The NCSC provides effective leadership and support to the counterintelligence and security activities of the U.S. Intelligence Community, the U.S. government, and U.S. private sector entities who are at risk of intelligence collection or attack by foreign adversaries.

Russia is WAY too close to Compromising Communications Cables

 

Russian aggression and look who is in the White House…..chilling….

Submarine Cable Map

PopularScience: For the past five years, John Rennie has braved the towering waves of the North Atlantic Ocean to keep your e-mail coming to you. As chief submersible engineer aboard the Wave Sentinel, part of the fleet operated by U.K.-based undersea installation and maintenance firm Global Marine Systems, Rennie–a congenial, 6’4″, 57-year-old Scotsman–patrols the seas, dispatching a remotely operated submarine deep below the surface to repair undersea cables. The cables, thick as fire hoses and packed with fiber optics, run everywhere along the seafloor, ferrying phone and Web traffic from continent to continent at the speed of light.

The cables regularly fail. On any given day, somewhere in the world there is the nautical equivalent of a hit and run when a cable is torn by fishing nets or sliced by dragging anchors. If the mishap occurs in the Irish Sea, the North Sea or the North Atlantic, Rennie comes in to splice the break together.

On one recent expedition, Rennie and his crew spent 12 days bobbing in about 250 feet of water 15 miles off the coast of Cornwall in southern England looking for a broken cable linking the U.K. and Ireland. Munching fresh doughnuts (a specialty of the ship’s cook), Rennie and his team worked 12-hour shifts exploring the rocky seafloor with a six-ton, $10-million remotely operated vehicle (ROV) affectionately known as “the Beast.”

As  Russia scopes undersea cables, a shadow of the United States’ Cold War past

WaPo: On Sunday, the New York Times reported that Russian submarines and spy ships are operating near vital undersea fiber-optic cables that transmit the majority of the planet’s communication and economic data.

The fear, the report stipulates, is that Russia might be looking for weak spots that could be attacked and severed during a conflict.

Though the tactics and threat are reminiscent of the Cold War, the Russians appear to be taking a page out of the book that the U.S. Navy and the NSA wrote in the 1970s in a series of undersea wire-tapping missions that became known as Operation Ivy Bells.

Briefly mentioned in the Times report, Operation Ivy Bells is written about extensively in the book “Blind Man’s Bluff: The Untold Story of American Submarine Espionage” by Sherry Sontag and Christopher Drew. The missions used submarines to listen in on previously untapped Soviet “hard-lines” to glean information about Soviet ballistic missile submarine deployments and strategy.

In 1970, at the height of the Cold War, James Bradley, the director of undersea warfare at the Office of Naval intelligence dreamed up one of the most daring submarine spy missions in modern history. He wanted to send the specially outfitted 350ft nuclear-powered submarine, the Halibut, to land over the ocean floor under the Sea of Okhotsk and tap a phone line that connected the Soviet submarine base at Petropavlovsk to its Pacific Fleet headquarters near Vladivostok.

Besides the risk of international incident if Halibut was caught or detected, there was no evidence that the phone line even existed. The only evidence that Bradley had was the notion that the sub base in Petropavlovsk was probably required to give constant updates back to its higher headquarters. So Bradley, sitting in his Pentagon office at 3 a.m., thought back to his childhood, racking his brain to figure out where the Soviets might have laid their cables.

According to “Blind Man’s Bluff,” Bradley, in his predawn stupor, recalled from his youth written signs that had been posted along the Mississippi River to mark undersea cables. The signs, posted along the shore, were meant to prevent passing from hooking the cables with their anchors.

With this in mind, Bradley reasoned that there had to be similar signs near the shallower points on the Sea of Okhotsk.

So, with Bradley’s childhood in mind, “the most daring acts of tele-piracy of the Cold War” was born.

After an extensive multi-year refit that began in the late 60s, Halibut was ready to depart from Mare Island Naval Shipyard outside of San Francisco for Okhotsk in 1972. One of the sub’s most noticeable additions was a giant hump mounted behind its conning tower, a hump that was publicly declared as a hangar for a deep sea rescue vehicle but was actually a “decompression and lockout chamber” for the team of divers that would exit the sub to tap the Soviet cables.

So in October 1972, the crew of Halibut made its way across the Pacific, its older nuclear reactor pushing her across the sea at just over 10 knots. First the spy sub moved north to the Aleutian Islands, then past the Bering Straight and into the Sea of Okhotsk. The captain of the Halibut, Navy Cmdr. Jack McNish, had not told the crew where it was going—only that they were leaving home for three months and that they were searching for the remnants of a new Soviet infared anti-ship missile that the United States was desperately seeking a counter-measure for.

Once inside the Sea of Okhotsk, the Halibut slowly patrolled with its periscope up, scanning the coastline for Bradley’s signage that would mark the cables. And then, after a week of patrolling with no luck, the Halibut found a sign on the northern shore of the Sea of Okhotsk that said something to the extent of “Do Not Anchor. Cable Here” in Russian.

The Halibut, after locating the sign, launched a specially designed submersible or “fish,” that then proceeded to search for the cables. The fish had a very basic video camera, and a higher definition camera. While the video was relayed in real-time back to the submarine, the film from the camera had to be retrieved from the fish and subsequently developed while the Halibut was near the surface so that the sub’s dark room could properly vent or “snorkel” the chemicals used to develop the film.

Hours after the fish’s launch, footage began to come back of foot-long bumps in the sand, a sort of Morse code etched in the sea bottom. The Halibut had found the cables.

According to “Blind Man’s Bluff,” the fish was then retrieved and the film developed, revealing the Soviet cables strewn along the seafloor.

After identifying the cables, McNish maneuvered the Halibut well outside the 3-mile territorial limit of the Soviet Union and located a spot just above the cable where he could lower the submarine’s two massive anchors in a sort-of hover.

Using specially designed rubber wet suits that fit loosely and were pumped full of hot water to counter the freezing temperatures of the Sea of Okhotsk, the divers departed the Halibut armed with pneumatic air-guns to blow debris off the cables and emergency oxygen bottles in case their “umbilical cords” that connected them back to the Halibut were severed.

The wire-tap, according to “Blind Man’s Bluff,” was three-feet long and composed of a tape recorder and a lithium ion battery. A connector would wrap around the cable and draw out the words and data through induction. There was no cutting into the cable.

For the next few hours the recording device attached to the cable relayed Soviet communications back to a select group of spies aboard the Halibut who would then, after the completion of the mission and a successful return to port, send the tapes to Fort Meade, Md, where they would be subsequently analyzed.

With the tap successful, the Halibut then moved to its secondary mission of locating the Soviet missile fragments before returning to port. With the mission a success, Bradley saw a future filled with taps around the globe that could record for months and years continuously, without the presence of an American sub to collect the data.

In August 1972, the Halibut departed once more for the Sea Okhotsk to repeat the tap. This time, however, the sub was rigged with explosives in case the sub and her crew were ever compromised. This time too, according to Blind Man’s Bluff, McNish told his crew about their actual mission and the risks it entailed.

In the years following more submarines would be outfitted like Halibut, and they too would conduct similar wire-taps. Operation Ivy Bells had begun.