recentpopularlog in

jerryking : counterintelligence   10

The Iran Cables: Secret Documents Show How Tehran Wields Power in Iraq - The New York Times
By Tim Arango, James Risen, Farnaz Fassihi, Ronen Bergman and Murtaza Hussain

Nov. 18, 2019

An unprecedented leak exposes Tehran’s vast influence in Iraq, detailing years of painstaking work by Iranian spies to co-opt the country’s leaders, pay Iraqi agents working for the Americans to switch sides and infiltrate every aspect of Iraq’s political, economic and religious life.

Many of the cables describe real-life espionage capers that feel torn from the pages of a spy thriller. Meetings are arranged in dark alleyways and shopping malls or under the cover of a hunting excursion or a birthday party. Informants lurk at the Baghdad airport, snapping pictures of American soldiers and keeping tabs on coalition military flights. Agents drive meandering routes to meetings to evade surveillance. Sources are plied with gifts of pistachios, cologne and saffron. Iraqi officials, if necessary, are offered bribes. The archive even contains expense reports from intelligence ministry officers in Iraq, including one totaling 87.5 euros spent on gifts for a Kurdish commander.
CIA  counterintelligence  covert_operations  espionage  influence  informants  Iran  Iraq  leaks  political_power  Qassim_Suleimani  Quds_Force  security_&_intelligence  Tehran 
november 2019 by jerryking
Opinion | The Spy Business Is Booming and We Should Be Worried - The New York Times
By Bill Priestap
Mr. Priestap led the F.B.I.’s counterintelligence division from 2015 through 2018
counterintelligence  espionage  security_&_intelligence 
july 2019 by jerryking
Canada must not be naive when dealing with China’s authoritarian regime
March 4, 2019 | The Globe and Mail | by HUGH SEGAL, SPECIAL TO THE GLOBE AND MAIL

Claws of the Panda, Jonathan Manthorpe’s new best-selling book, a meticulous and well-researched highly readable history of decades of Canada-China relations, is important because it's a primer on the central challenge of our era – how democracies address the scope and depth of an authoritarian wave now picking up momentum.....The Communist Party of China, its presumption of sovereignty not only at home, but also over ethnic Chinese worldwide, is not about to relinquish or dilute its central and presumptive power and control. It certainly won’t do this as a result of peaceful entreaties from middle powers, however respectful or well-meaning.....while the People’s Republic of China has every right to manage its internal affairs without interference, we also have the right to pursue our own national interest without undue Chinese influence......Manthorpe’s work clearly underlines is the economic, social and political equation at China’s core: Prosperity is the result of central control, focus and a clearly defined Communist Party and state-driven purpose. Qualities we hold as important – the right of dissent, democratic pluralism, freedom from fear – are seen by the Chinese government as weaknesses in our democratic societies to be exploited in the new great game of global trade and diplomatic competition.......Our challenge, in terms of diplomatic, trade and strategic policy, is with the Communist Party and the government and forces it controls, not with the Chinese people.........In assessing the intent of any global competitor, contextual awareness is one of the first requirements for tactical understanding and strategic planning. The revelations of Claws of the Panda offer a clear set of contextual conclusions for a well meaning middle power like Canada......We need new rules of the road.

Our engagement with China must set aside the temptations of presuming fair minded universal intent on the part of Chinese state-controlled instruments, economic, diplomatic or military. We must be more focused on the protection of our own security and freedoms from Chinese subversion, including the freedoms of our fellow Canadians of Chinese extraction. Countries that wish access to our resources, technology and investment on normative terms do not get to launch cyber attacks against us, from military and intelligence units controlled by the state. We must invest more with our allies in counter-intelligence and joint naval, air and cyber capacity in the Asian Pacific, not to threaten China’s legitimate regional dominance, or peaceful global economic aspirations, but to preclude illegitimate adventurism which a Chinese communist authoritarian regime might well pursue if costs and risks to them are unclear.
====================================================================
Claws of the Panda gives a detailed description of the CCP's campaign to embed agents of influence in Canadian business, politics, media and academia. The party's aims are to be able to turn Canadian public policy to China's advantage, to acquire useful technology and intellectual property, to influence Canada's international diplomacy, and, most important, to be able to monitor and intimidate Chinese Canadians and others it considers dissidents.
authoritarian  alliances  Asia_Pacific  authoritarianism  books  Canada  Canada-China_relations  centralized_control  China  China_rising  Chinese  Chinese-Canadians  Chinese_Communist_Party  counterintelligence  cyberattacks  economic_protectionism  fair_minded  history  Hugh_Segal  influence  influence_peddling  intimidation  maritime  mercantilism  middle-powers  naivete  new_rules  primers  rules_of_the_game  security_&_intelligence  situational_awareness  worldviews 
march 2019 by jerryking
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
NOV. 12, 2017 | The New York Times | By SCOTT SHANE, NICOLE PERLROTH and DAVID E. SANGER.

“These leaks have been incredibly damaging to our intelligence and cyber capabilities,” said Leon E. Panetta, the former defense secretary and director of the Central Intelligence Agency. “The fundamental purpose of intelligence is to be able to effectively penetrate our adversaries in order to gather vital intelligence. By its very nature, that only works if secrecy is maintained and our codes are protected.”
adversaries  data_breaches  hacking  vulnerabilities  counterintelligence  counterespionage  moles  malware  ransomware  Fedex  Mondelez  Edward_Snowden  security_&_intelligence  Russia  Leon_Panetta  NSA  cyber_security  cyber_warfare  cyberweapons  tools  David_Sanger  SecDef  CIA 
november 2017 by jerryking
Killing C.I.A. Informants, China Crippled U.S. Spying Operations - The New York Times
By MARK MAZZETTI, ADAM GOLDMAN, MICHAEL S. SCHMIDT and MATT APUZZOMAY 20, 2017

The Chinese government systematically dismantled C.I.A. spying operations in the country starting in 2010, killing or imprisoning more than a dozen sources over two years and crippling intelligence gathering there for years afterward.

Current and former American officials described the intelligence breach as one of the worst in decades. ..... The C.I.A. considers spying in China one of its top priorities, but the country’s extensive security apparatus makes it exceptionally hard for Western spy services to develop sources there.

At a time when the C.I.A. is trying to figure out how some of its most sensitive documents were leaked onto the internet two months ago by WikiLeaks, and the F.B.I. investigates possible ties between President Trump’s campaign and Russia, the unsettled nature of the China investigation demonstrates the difficulty of conducting counterespionage investigations into sophisticated spy services like those in Russia and China.....As more and more sources vanished, the operation took on increased urgency. Nearly every employee at the American Embassy was scrutinized, no matter how high ranking. Some investigators believed the Chinese had cracked the encrypted method that the C.I.A. used to communicate with its assets. Others suspected a traitor in the C.I.A., a theory that agency officials were at first reluctant to embrace — and that some in both agencies still do not believe.
CIA  China  espionage  security_&_intelligence  informants  counterintelligence  moles  counterespionage  covert_operations 
may 2017 by jerryking
Manage like a spymaster | The Economist
Aug 29th 2015 |

The first lesson from the spymasters is that sometimes the convenience of having everything easily accessible on an internal network has to be sacrificed. Intelligence agencies’ most important stuff may not be kept on computers at all—manual typewriters and carbon paper still have their uses. ...Another lesson from counter-intelligence is the use of deception. The best way to find out if you are being attacked is to offer a tempting target. “Honeypots” are bogus but convincing computers, networks and files which will attract an attacker’s attention, while revealing his presence to the silent watchers. ...If you find out who is attacking you, and what they want, you have some options. You can bring in law-enforcement: breaching someone else’s network is a crime in most jurisdictions. ...Managers could also do with practising a little of the constructive paranoia that spymasters adopt when dealing with technology.
security_&_intelligence  cyber_security  spymasters  counterintelligence  deception  paranoia  industrial_espionage  spycraft  hackers 
august 2015 by jerryking
The Meaning of al Qaeda's Double Agent - WSJ.com
JANUARY 7, 2010 | Wall Street Journal | by Reuel Marc Gerecht.
The jihadists are showing impressive counterintelligence ability that
the CIA seems to have underestimated.
Jihad  security_&_intelligence  Afghanistan  counterintelligence  CIA  al-Qaeda  moles 
january 2010 by jerryking

Copy this bookmark:





to read