Retired Army Colonel John Mills
👤 PersonAppearances Over Time
Podcast Appearances
A guy who passed his polygraph, let me remind everybody, a guy who passed it multiple times, his full stroke poly. Interesting. That's another issue.
A good friend of mine, Save Christian, is dealing with multiple no-goes on his polygraph. Hmm. Isn't that interesting? They catch saved evangelical Christians, but they don't save, you know, what was it, reality winner, NSA Georgia? Hmm. Didn't catch her. Yeah, didn't catch Snowden. Didn't catch a bunch of people. Oh, yo, you know, who's the... Well, you don't catch people...
A good friend of mine, Save Christian, is dealing with multiple no-goes on his polygraph. Hmm. Isn't that interesting? They catch saved evangelical Christians, but they don't save, you know, what was it, reality winner, NSA Georgia? Hmm. Didn't catch her. Yeah, didn't catch Snowden. Didn't catch a bunch of people. Oh, yo, you know, who's the... Well, you don't catch people...
A good friend of mine, Save Christian, is dealing with multiple no-goes on his polygraph. Hmm. Isn't that interesting? They catch saved evangelical Christians, but they don't save, you know, what was it, reality winner, NSA Georgia? Hmm. Didn't catch her. Yeah, didn't catch Snowden. Didn't catch a bunch of people. Oh, yo, you know, who's the... Well, you don't catch people...
Holograph consumes an enormous amount of our counterintelligence resources. Absolutely. I think we need to invert that whole model. That should be used on an exception basis in very targeted situations. But it consumes, if people would see the budget books, which they're not supposed to see because they're classified, it consumes an enormous amount of resources that just
Holograph consumes an enormous amount of our counterintelligence resources. Absolutely. I think we need to invert that whole model. That should be used on an exception basis in very targeted situations. But it consumes, if people would see the budget books, which they're not supposed to see because they're classified, it consumes an enormous amount of resources that just
Holograph consumes an enormous amount of our counterintelligence resources. Absolutely. I think we need to invert that whole model. That should be used on an exception basis in very targeted situations. But it consumes, if people would see the budget books, which they're not supposed to see because they're classified, it consumes an enormous amount of resources that just
Look, look how many that this this one CIA officer recently who the Biden team was just chewing off a leg of Israel. Give us your war plans against Iran. And they got him in 30 seconds later. Iran had him because a CIA officer who was fully gave him, you know, there you go. Yeah.
Look, look how many that this this one CIA officer recently who the Biden team was just chewing off a leg of Israel. Give us your war plans against Iran. And they got him in 30 seconds later. Iran had him because a CIA officer who was fully gave him, you know, there you go. Yeah.
Look, look how many that this this one CIA officer recently who the Biden team was just chewing off a leg of Israel. Give us your war plans against Iran. And they got him in 30 seconds later. Iran had him because a CIA officer who was fully gave him, you know, there you go. Yeah.
bottom line um if there if there has and i and i i know i said and spoke ill of our nsa brothers please forgive me uh and stop surveilling me but uh if there is a modicum of a check it's approved again you have to presume breach even on the higher level networks now i'm not gonna I'm not going to say yes or no, whether we've been breached on there, etc. You have to presume breach.
bottom line um if there if there has and i and i i know i said and spoke ill of our nsa brothers please forgive me uh and stop surveilling me but uh if there is a modicum of a check it's approved again you have to presume breach even on the higher level networks now i'm not gonna I'm not going to say yes or no, whether we've been breached on there, etc. You have to presume breach.
bottom line um if there if there has and i and i i know i said and spoke ill of our nsa brothers please forgive me uh and stop surveilling me but uh if there is a modicum of a check it's approved again you have to presume breach even on the higher level networks now i'm not gonna I'm not going to say yes or no, whether we've been breached on there, etc. You have to presume breach.
It's velocity, velocity, velocity in the modern era of the operations. And, okay, you know, I also, I wrote a sub-stack piece on this that contained many enumerated points. You know, one of them is...
It's velocity, velocity, velocity in the modern era of the operations. And, okay, you know, I also, I wrote a sub-stack piece on this that contained many enumerated points. You know, one of them is...
It's velocity, velocity, velocity in the modern era of the operations. And, okay, you know, I also, I wrote a sub-stack piece on this that contained many enumerated points. You know, one of them is...
Because at first, when I first wrote this, I wasn't clear on whether signal was, was this their personal signal or was this signal approved and behind the firewall, which on the end pass can still reach out to the general public beyond the .mil, the .gov, etc., Okay. So, it appears it was behind the firewall and they had Goldberg's telephone number. Okay. Oops.
Because at first, when I first wrote this, I wasn't clear on whether signal was, was this their personal signal or was this signal approved and behind the firewall, which on the end pass can still reach out to the general public beyond the .mil, the .gov, etc., Okay. So, it appears it was behind the firewall and they had Goldberg's telephone number. Okay. Oops.
Because at first, when I first wrote this, I wasn't clear on whether signal was, was this their personal signal or was this signal approved and behind the firewall, which on the end pass can still reach out to the general public beyond the .mil, the .gov, etc., Okay. So, it appears it was behind the firewall and they had Goldberg's telephone number. Okay. Oops.
But then also, I wrote a piece on that because contact lists are complex databases and even without malicious behavior, they can become confused. The databases can become confused, especially when you're using them across multiple platforms. Guess what?