World Bulletin/News Desk
The National Intelligence Organization (MIT) gave striking answers to the questions of parliamentarian members of the Parliament’s Wiretapping Commission. The MIT responses are summarized as follows:
VULNERABLE TO HACKING
If the necessary measures are not taken in today's world, all kinds of hardware and software means of communication are be monitored by means of technology. In addition transactions conducted over computer networks can be accessed and hacked from remote locations or infiltrated from within through cooperative methods. While such infiltration can occur through vulnerabilities at the institutional level, it can also result from personal mistakes and negligence.
SEND TO THOSE WHO MUST BE INFORMED
Formerly named the GES Command, the newly named SIB Electronic Intelligence and Communication executed the task of submitting the obtained information the relevant MIT and Turkish Armed Forces (TSK) units according to the “those who need to know principle.”
OUR SATELLITES CAN BE MONITORED
It is possible through technical mean for another country to monitor the communications transmitted through the country's satellite and so on., and the communications that go or come from abroad independent of the transmission medium.
While it is important from a strategic perspective that systems using satellite communication are located on national and ground stations in Turkey, due to communications being conducted via air, there is always a risk of being tapped by countries that have the necessary technology.
WE DO NOT USE TROJAN
We do not use the Trojan email virus software in our activities. Generally we use open source software in the development of software.
CIA, MOSSAD HAVE TURKISH OFFICES
(Can foreign intelligence services open offices in Turkey?) When necessary MIT cooperates with the intelligence services of foreign countries. In this sense, just as our organization has offices in other countries, the offices of other countries can be found in ours.
BE CAREFUL WITH PROMOTIONAL DEVICES
It should be taken into consideration that all kinds of electronic devices can be used by hostile elements for hidden listening and monitoring. On a personal basis, the necessary measures should especially be taken with promotional devices.
THREATS TO NATIONAL PROJECT PERSONNEL
(How do you assess plot initiatives toward the MILGEM, Milli Geni, and HAVELSAN projects?) We have started implementing the Counter Intelligence concept in order to detect and prevent potential threats to the national projects developed in strategic sectors, and the critical personnel working on said projects.
FETÖ terrorists revealed names of informants on the PKK, DHKP-C and ISIL to terror groups
Ankara, Istanbul military bases to be transferred to outskirt of cities by Sept. 11.
Official figures show greater optimism in economy
2 other soldiers have been wounded in separate attack in Hakkari
Council convenes for second time since July 15 coup bid
Officials from Turkey and US begin talks on Fetullah Gulen extradition in Ankara
Binali Yildirim says normalization of relations with Israel will never prevent Turkey's stand for Palestinians
The Turkish army shells ISIL in Jerablus, PYD in Manbij
Meeting is first at ministerial level with EU member since defeated coup in Turkey
'www.coupfacts.com' highlights Turkish nation's historic resistance to July 15 coup bid
Council to convene for second time since last month’s coup attempt
Fight against Fetullah Terror Organization, new constitution, developments in Syria come under discussion at meeting
Europe either failed to understand gravity of July 15 coup attempt or just did not want to understand it
Several of the wounded in Saturday's terror attack remain under treatment at hospitals
Terrorists target gendarmerie command, police office in Tunceli province, police source says
You cannot divide this country, Foreign Minister Mevlut Cavusoglu says