The National Intelligence Organization (MIT) gave striking answers to the questions of parliamentarian members of the Parliament’s Wiretapping Commission. The MIT responses are summarized as follows:
VULNERABLE TO HACKING
If the necessary measures are not taken in today’s world, all kinds of hardware and software means of communication are be monitored by means of technology. In addition transactions conducted over computer networks can be accessed and hacked from remote locations or infiltrated from within through cooperative methods. While such infiltration can occur through vulnerabilities at the institutional level, it can also result from personal mistakes and negligence.
SEND TO THOSE WHO MUST BE INFORMED
Formerly named the GES Command, the newly named SIB Electronic Intelligence and Communication executed the task of submitting the obtained information the relevant MIT and Turkish Armed Forces (TSK) units according to the “those who need to know principle.”
OUR SATELLITES CAN BE MONITORED
It is possible through technical mean for another country to monitor the communications transmitted through the country’s satellite and so on., and the communications that go or come from abroad independent of the transmission medium.
While it is important from a strategic perspective that systems using satellite communication are located on national and ground stations in Turkey, due to communications being conducted via air, there is always a risk of being tapped by countries that have the necessary technology.
WE DO NOT USE TROJAN
We do not use the Trojan email virus software in our activities. Generally we use open source software in the development of software.
CIA, MOSSAD HAVE TURKISH OFFICES
(Can foreign intelligence services open offices in Turkey?) When necessary MIT cooperates with the intelligence services of foreign countries. In this sense, just as our organization has offices in other countries, the offices of other countries can be found in ours.
BE CAREFUL WITH PROMOTIONAL DEVICES
It should be taken into consideration that all kinds of electronic devices can be used by hostile elements for hidden listening and monitoring. On a personal basis, the necessary measures should especially be taken with promotional devices.
THREATS TO NATIONAL PROJECT PERSONNEL
(How do you assess plot initiatives toward the MILGEM, Milli Geni, and HAVELSAN projects?) We have started implementing the Counter Intelligence concept in order to detect and prevent potential threats to the national projects developed in strategic sectors, and the critical personnel working on said projects.worldbulletin