Quotulatiousness

March 27, 2013

MI5 and GCHQ will include assistance from the IT industry in the fight against online crime

Filed under: Britain, Government, Technology — Tags: , , , , — Nicholas @ 08:42

Two of the British government’s top intelligence agencies will team up with specialists from the IT field in a new initiative to counter online “cyber” crime:

Cyber-security experts from industry are to operate alongside the intelligence agencies for the first time in an attempt to combat the growing online threat to British firms.

The government is creating a so-called fusion cell where analysts from MI5 and GCHQ, the domestic eavesdropping agency, will work with private sector counterparts.

The cell is part of the Cyber Security Information Sharing Partnership (Cisp), launched on Wednesday, to provide industry with a forum to share details of techniques used by hackers as well as methods of countering them.

At any one time there will be about 12 to 15 analysts working at the cell, based at an undisclosed location in London.

“What the fusion cell will be doing is pulling together a single, richer intelligence picture of what is going on in cyberspace and the threats attacking the UK,” a senior official said.

John Leyden at The Register has more:

The programme, which follows a successful pilot scheme in 2011, is designed to support the wider aims of the UK’s cyber security strategy: such as making Britain the best country in the world to do e-business and protecting critical components of the national infrastructure (ie banks, utilities, telecoms and power grid).

Eighty companies from five key sectors of the economy — finance, defence, energy, telecommunications and pharmaceuticals — were encouraged to share information as part of the pilot scheme. The wider programme (involving a reported 160 organisations, at least initially) will allow access to a secure web-portal to gain access to shared threat intelligence information in real time, the BBC reports.

[. . .]

Terry Greer-King, UK MD for internet security firm Check Point, commented:

“This is a key step forward for both Governments and business in fighting web attacks, and reducing their impact. It’s essential that organisations collaborate and share intelligence with each other to track emerging threats, mitigate their severity or block them before they cause damage. Fighting threats together is much more effective than fighting alone.”

“In 2012, our research found that 63 per cent of organisations were infected with bots, and 54 per cent infected with malware that they didn’t know about. Any move which helps to reduce these figures is very welcome,” he added.

March 20, 2013

The Profumo affair in context

Filed under: Britain, History, Media — Tags: , , , — Nicholas @ 10:06

In History Today, Richard Weight reviews An English Affair: Sex, Class and Power in the Age of Profumo by Richard Davenport-Hines which is being published on the 50th anniversary of the Profumo affair:

Meticulous though he is in separating historical fact from tabloid fiction, Davenport-Hines does not unearth any new secrets about the Profumo Affair. The originality of the book lies in the way he places it in the context of mid-20th century social attitudes. This, as the author says, is ‘a study of milieux’. An accomplished biographer, he puts colour on the cheeks and sparkle in the eyes of the main protagonists in a series of beautifully written portraits. We get to know fully Stephen Ward, for example – the high society osteopath who became the scapegoat of the affair – as a closet homosexual and vain Walter Mitty character, whose social climbing stemmed partly from the fact that osteopathy was dismissed by the medical establishment as ‘a modish form of cosseting’. Ward helped introduce the 46-year-old secretary of state for war, Jack Profumo, to the 19-year-old showgirl, Christine Keeler, at a pool party in the grounds of Cliveden on a July weekend in 1961. Soon after they began the fateful affair that linked him, via pillow talk and paranoia, to a Soviet military attaché that Keeler knew.

[. . .]

Jack Profumo typified British male attitudes: he had forced his wife, the actress Valerie Hobson, to give up her career for the sake of his image, before taking the lover who was raised in a converted railway carriage near Staines. The author describes Keeler and her friend Mandy Rice-Davies as ‘good-time girls who refused to be doormats’ – a new breed of ambitious women less willing to shut up once they had served their purpose. In a sense, Keeler anticipated the glamorous defiance of ‘the People’s Princess’ in the 1990s. And, like Diana Spencer’s, this is a story about the vacuity of the British people as much as it is a story about the hypocrisy of their leaders.

Davenport-Hines also confronts race, the subject usually ignored by historians of the affair. It was the jealous fight between two of Keeler’s black boyfriends outside the Flamingo Club in 1962 that led to a shooting through which the press got hold of the Profumo story. Then a taboo in a predominantly racist country, inter-racial sex gave the cocktail of cross-class transgression an extra shot of liqueur for the public to enjoy. Yet, as the author observes, the Flamingo Club was a multiracial Soho jazz venue then favoured by the ‘hip white Mods’ of Britain’s first youth culture. In other words the Profumo Affair didn’t so much change Britain as reveal how much it was already changing underneath the cracked surface of prudery and prejudice.

Barack’s secret spying club

Filed under: Government, Law, Liberty, USA — Tags: , , , , , — Nicholas @ 09:23

In Reason, Jacob Sullum explains why the ruling against the promiscuous use of National Security Letters was needed:

After 9/11, Congress loosened restrictions on national security letters (NSLs), a kind of administrative subpoena, first authorized in 1986, that the FBI uses to demand information from phone companies, Internet service providers, and financial institutions. According to the Justice Department’s inspector general, NSL “requests” skyrocketed from a total of 8,500 between 1986 and 2000 to more than 56,000 in 2004 alone.

The Obama administration has made liberal use of NSLs, which in 2010 allowed the FBI to peruse information about 14,212 American citizens and permanent residents — a new record — without bothering to get clearance from a judge. If you were one of those people, the odds are that you will never know, because NSLs are almost always accompanied by instructions that prohibit recipients from discussing them.

[. . .]

Secrecy frustrates challenges to counterterrorism tactics even in the case of Obama’s most startling claim to executive power: the authority to kill people he identifies as members or allies of Al Qaeda. In January a federal judge ruled that the Freedom of Information Act does not require Obama to disclose the Justice Department memos that explain the legal rationale for this license to kill.

U.S. District Judge Colleen McMahon expressed frustration with this result, saying, “I can find no way around the thicket of laws and precedents that effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reasons for their conclusion a secret.” In his State of the Union address the following month, Obama promised to make his “targeting” of suspected terrorists “even more transparent.” I’ll disbelieve it when I don’t see it.

February 28, 2013

North Korea struggling with loss of faith in the state

Filed under: Asia, China, Government — Tags: , , , , , — Nicholas @ 08:50

Strategy Page on the challenges facing the government as the younger generation grows up:

A major source of information about North Korea is obtained by South Korean intelligence experts interviewing the steady flow of refugees arriving in South Korea (via China and the South Korean embassies in neighboring countries like Thailand). For the last decade, over a thousand of these refugees have arrived each year. In the last few years China and North Korea have increased their efforts to reduce that number, which peaked at 2,900 in 2009 and was 1,500 last year. These determined and desperate people keep coming. Separate interviews are compared and checked against each other to obtain an updated and accurate first-hand view of life in the north. This also helps detect the spies North Korea tries (often with success) getting into the south via the refugee route. While the refugees detail the growing decline in living standards up north, it’s also become clear that there is a very real generational shift in loyalties in the north. The generation who grew up during the 1990s famine (that killed about ten percent of the population and starved most of the rest for years) no longer believe in the North Korean dictatorship. Many who came of age before 1990 still do, but for most everyone under 30 the state is the enemy and self-reliance, and not a benevolent dictatorship, is the only way to survive. The North Korean government has been fighting these attitudes more and more, as this generation of unbelievers grows larger each year. The more astute members of the northern leadership see this as a no-win situation. Eventually most North Koreans will be very hostile to the state and more adept at making money in spite of the government, or simply getting out of the country. Most of the leadership is still afraid of enacting Chinese style economic reforms because they believe a more affluent population would seek revenge for the decades of misrule and tyranny. The Chinese say that didn’t happen in China. The North Koreans point out that, as bad as the Chinese communists were in the 1950s and 60s (killing over 50 million people via starvation, labor camps and execution) that was not as bad (proportionately) as what the North Koreans have suffered. Moreover, the North Korean leaders point out that, historically, Koreans have been a bit more excitable and brutal when aroused by misrule. The Chinese say times have changed but the North Korean leaders are not yet willing to bet their lives on that being the case.

The refugees report that most North Koreans understand that the police state up there is strong enough to suppress any uprising now or in the foreseeable future and that the only real threat to the dictatorship is intervention (openly or via a coup) by China. Refugees also report that it’s common knowledge that hundreds of North Koreans have died of radiation poisoning or been born with birth defects because of the uranium mining and working with nuclear materials. The government has responded by offering large cash bonuses to those who will work in the uranium mines. The refugees report in detail many other ways the Kim government abuses their subjects.

Cybersecurity … can it be anything more than fear + handwaving = “we must have a law!”

Filed under: Business, Government, Law, Technology — Tags: , , , , , — Nicholas @ 00:01

At Techdirt, Mike Masnick fisks “the worst article you might ever read about ‘Cybersecurity'”:

There has been a lot of discussion lately about “cybersecurity” “cyberwar” “cyberattacks” and all sorts of related subjects which really really (really!) could do without the outdated and undeniably lame “cyber-” prefix. This is, in large part, due to the return of CISPA along with the White House’s cybersecurity executive order. Of course, the unfortunate part is that we’re still dealing in a massive amount of hype about the “threats” these initiatives are trying to face. They’re always couched in vague and scary terms, like something out of a movie. There are rarely any specifics, and the few times there are, there is no indication how things like CISPA would actually help. The formula is straightforward: fear + handwaving = “we must have a law!”

However, I think we may now have come across what I believe may top the list of the worst articles ever written about cybersecurity. If it’s not at the top, it’s close. It is by lawyer Michael Volkov, and kicks off with a title that shows us that Volkov is fully on board with new laws and ramping up the FUD: The Storm Has Arrived: Cybersecurity, Risks And Response. As with many of these types of articles, I went searching for the evidence of these risks, but came away, instead, scratching my head, wondering if Volkov actually understands this subject at all, with his confused thinking culminating in an amazing paragraph so full of wrong that almost makes me wonder if the whole thing is a parody.

[. . .]

There’s been plenty of talk about these Chinese hacks, which definitely do appear to be happening. But, what economic activity has been undermined? So far, the hacks may have been a nuisance, but it’s unclear that they’ve done any real damage. It is also unclear how CISPA helps stop such hacks, other than making Congress feel like it’s “done something.”

Are there issues with online security that need to be taken seriously? Yes, absolutely. Do we need legislation to deal with those problems? That’s debatable, and we’re still waiting for some evidence not just of scary sounding threats, but that this kind of legislation will actually help. Unfortunately, this article keeps us waiting. But, it did make us laugh. Unintentionally (we think).

December 7, 2012

Revisiting Pearl Harbour

Filed under: History, Japan, Military, Pacific, USA, WW2 — Tags: , , , , — Nicholas @ 10:38

In a History Today article from 2001, Dan van der Vat looks at the actual history rather than the film treatments of the Japanese attack on Pearl Harbour in 1941:

To recount what actually happened blow by blow, as in the exhaustive Tora, Tora, Tora!, is one thing; to use the event as the backdrop to an avowed fiction, as in From Here to Eternity, is equally legitimate. But to play fast and loose with history by presenting fiction as fact is at best confusing and at worse dangerous — especially when the event is still within living memory, affects current policy and needs to be understood by the young if the lessons of history are to be truly learned.

On Roosevelt’s ‘date that will live in infamy’, six Japanese carriers launched 350 aircraft to immobilise the US battlefleet at the very moment talks were due to resume in Washington. The Americans knew Japan’s propensity for surprise attack (Korea in 1895, the Russians’ Chinese enclave at Port Arthur in 1904, Manchuria in 1931, China in 1937). They were forewarned by their Tokyo embassy of the inclusion of Pearl Harbor in Japan’s war-plans, and they intercepted signals exposing its intentions. Yet the Japanese achieved strategic surprise. But their strategic blunder in not bombing repair facilities and fuel dumps spared the US Navy the crippling embarrassment of having to withdraw 2,200 miles eastward to the continental West Coast.

[. . .]

Initial American reaction to Pearl Harbor included not only rage at Japanese duplicity but also incredulity based on racism. Many witnesses insisted they had seen swastikas on the bombers; surely the Germans must have been behind such a sophisticated stroke. Inability to cope with the reality of America’s most spectacular lost battle led to a flourishing conspiracy industry which sprang up within hours of the bombing.

Even today, extreme revisionists claim that British frogmen came in on the midget Japanese submarines that almost gave the game away by trying to attack before the bombers. That at least one batch of intelligence intercepts from 1941 has not yet been released is taken as proof that they must conceal the ‘smoking gun’ the revisionists so stubbornly seek to this day.

Update: MHQ has the story of the most effective Japanese spy who reported on the comings and goings of US Navy ships at Pearl Harbour:

At 1:20 a.m. on December 7, 1941, on the darkened bridge of the Japanese aircraft carrier Akagi, Vice Admiral Chui­chi Nagumo was handed the following message: “Vessels moored in harbor: 9 battleships; 3 class B cruisers; 3 seaplane tenders, 17 destroyers. Entering harbor are 4 class B cruisers; 3 destroyers. All aircraft carriers and heavy cruisers have departed harbor….No indication of any changes in U.S. Fleet or anything unusual.”

[. . .]

Astonishingly, such critical intelligence was not the work of a brilliant Japanese superspy who had worked his way into the heart of the fleet’s installation. Rather, Takeo Yoshikawa, a naval officer attached to the consulate and known to the Americans, had simply watched the comings and goings of the fleet from afar, with no more access than a tourist. He made little effort to cloak his mission, and almost certainly would have been uncovered if American intelligence had been more on the ball, or if America’s lawmakers had recognized the mortal threat Japan presented. Instead, he raised little suspicion, and his observations helped the Japanese piece together an extraordinarily detailed attack plan, ensuring its success.

December 6, 2012

NZ court allows Kim Dotcom to sue for illegal spying

Filed under: Business, Law, Liberty, USA — Tags: , , , , — Nicholas @ 10:01

This could get interesting quickly:

Details of the top secret international spy agency ring known as Echelon will have to be produced after a new judgment in the Kim Dotcom case.

The internet tycoon was also cleared to pursue a case for damages against the police and the Government Communications Security Bureau in a judgment which has opened the Government’s handling of the criminal copyright case for its harshest criticism yet.

[. . .]

Chief high court judge Helen Winkelmann said the GCSB would have to “confirm all entities” to which it gave information sourced through its illegal interception of Dotcom’s communications.

She said her order included “members of Echelon/Five Eyes, including any United States authority”. The Echelon network is an international intelligence network to which New Zealand and the United States are members, along with Australia, Canada and the United Kingdom.

The judgment also recorded Dotcom’s suspicions he had been spied on at least six weeks before the GCSB admitted to doing so, and sought details as to whether others had been swept up in the illegal operation.

Update: Moved the video below the fold to stop it auto-playing any time someone visited the blog main page.

(more…)

October 31, 2012

The science of “shaken, not stirred”

Filed under: Books, History, Media, Science — Tags: , , , — Nicholas @ 09:05

Ah, those dedicated researchers at The Register! This time, they’ve got Gavin Clarke looking into the famous dry martini of James Bond:

“A distressingly large amount of rubbish is talked about cocktails,” Noel Jackson, top boffin at the Life Science Centre in Newcastle-Upon-Tyne, tells The Reg.

Jackson, a Cambridge-University-educated chemist, has all the straight-up science on alcohol.

“We do a lot of debunking of things that people think are true,” he tells us. “There’s this business of shaken versus stirred. Once you heard it said from people in the cocktail world that shaking ‘bruises’ a liquid! That’s rubbish.”

The Reg, as part of our ongoing celebration of James Bond’s fiftieth year on film, was talking to Jackson about one of the signature elements of the 007 package: the dry vodka martini. Shaken, not stirred.

Jackson comes on the best of recommendations. We were put onto him by the boffins of the UK’s National Physical Laboratory, who have been instrumental in such developments as packet-switched networking and the “Dambuster” bouncing bomb of World War II fame.

“What he doesn’t know about drinks, doesn’t need to be known,” they told us.

We spoke to Jackson about chemicals and thermal dynamics. We start with flavour, and that means talking alcohol.

October 25, 2012

Something amusing out of Wikileaks

Filed under: Bureaucracy, Government, Humour, Military — Tags: , , — Nicholas @ 08:43

Charles Stross linked to this Wikileak-ed PDF this morning: The Stratfor Glossary of Useful, Baffling and Strange Intelligence Terms.

Access
Ability of an agent to get hold of information. Difference between having someone on the ground and someone who is actually valuable is access. Having someone on the ground in Washington DC doesn’t tell you if he works for the National Security Council or sells hotdogs on the corner. In intelligence there are three things that matter: access, access and access. Rule of thumb: anyone who says they have access doesn’t.

[. . .]

After Action Report
The final report on the conclusion of an Op. Intended for internal use only. Never show the customer. It’s like showing someone how sausage is made. Nauseating.

[. . .]

ATF
Alcohol Tobacco and Fire Arms. Rednecks with a license to kill. Never, ever, ever ask for their help on anything.

[. . .]

Case Officer
The person who manages an agent in the field. The management of an agent is a craft in itself, requiring the skills of a psychologist and the morals of a pimp. Highly prized in the business.

[. . .]

CIA
Central Intelligence Agency. Also called “Langley” or “up river.” Owns human intelligence (directorate of operations) and analysis (directorate of intelligence). Director, CIA is supposed to oversee all of the intelligence community. Isn’t that a joke? Imagine the Post Office with a foreign policy.

October 24, 2012

How to betray your country in one easy walk into a foreign embassy

Filed under: Cancon, Military, Russia — Tags: , , , , — Nicholas @ 14:58

The story of how a Canadian officer decided to turn traitor and pass secret intelligence to Russia:

When news first broke that the RCMP had arrested a low-ranked Canadian naval officer for providing intelligence to a foreign power, the press was quick to focus on the fact that the officer, Jeffrey Paul Delisle, had previously gone bankrupt. That was exactly the sort of thing a foreign country would look to exploit in a potential recruit. But we know now that Delisle didn’t need to be recruited. Heartbroken and contemplating suicide, he walked into the Russian Embassy in Ottawa and volunteered his services.

[. . .]

Over and over, the RCMP agent returns to one question: Why? He offers friendly comments, assuring Delisle that he knows how much pain, so much pain, he would have been feeling after his divorce. Delisle breaks down. He shares the story of how he found his wife, whom he’d loved since high school, cheating on him. She only married him, Delisle claims she told him, for security. She left him and hooked up with a new man, and was pregnant with the new partner’s child shortly thereafter. Delisle bitterly recalls hosting his ex-wife and her boyfriend at a Christmas Eve party, because his daughter wanted him to. And he wanted to make her happy.

Delisle’s love for his children shines though his statements. He clearly adores them. He says they were the only thing that prevented him from indulging his wish to commit suicide, to steer his car into oncoming traffic. He decided that he’d live for them. Indeed, he was caring for them, his ex-wife apparently being out of the picture — another source of bitterness. Having decided that he was dead inside, but obligated to live, Delisle says he decided to commit “professional suicide.” So he walked into the Russian Embassy and offered to become a spy.

October 19, 2012

Why James Bond drove an Aston Martin instead of a Jaguar

Filed under: Books, Britain, Media — Tags: , , , , — Nicholas @ 09:01

At The Register, John Oates looks at 007’s motor cars over the years:

What car should James Bond really drive? It’s a hotly disputed question.

Our man on film is closely associated with the Aston Martin, the DB5 initially and DBS V12 of late. Clearly the producers of recent Bond outings hope to identify their character with the spirit of an earlier time regarded as iconic and special. And they should, because the DB5 is both of these.

All of which is rather odd, because the book that introduced James Bond — Casino Royale — referred to a 4.5 litre Bentley with an Amherst Villiers supercharger. However, this is Bond’s personal car, and hobby, rather than work vehicle. We’re told he bought it almost new in 1933 and stored it through the war.

“Bond drove the car hard and well and with an almost sensual pleasure.”

[. . .] Jaguar’s E-type had set the world on fire that year. It had a slightly smaller engine at launch than the DB5, but was 500 pounds lighter and looked like no other car before it. By 1964 the engine had increased to a 4.2 litre brute not far off that in Bond’s Bentley.

Broccoli supposedly called Jaguar to ask for a couple of E-types — the car had come out the previous year and was welcomed by Enzo Ferrari as the most beautiful car in the world. It cost half the £4,175 an Aston-Martin would set you back.

So Broccoli rang Jaguar boss Sir William Lyons and asked to borrow a couple for the film. Lyons told him to get stuffed. To be fair to Lyons his firm was already struggling to make enough E-types to satisfy the public clamour for the car.

So Broccoli phoned Aston Martin and Bond ended up in a DB5 instead.

October 13, 2012

HMS Conqueror and “Operation Barmaid”

Filed under: Britain, History, Military — Tags: , , , , — Nicholas @ 00:01

In spite of the name, it had nothing to do with a crew booze-up in town:

HMS Conqueror is famous, some would say notorious, for sinking the Argentinian cruiser General Belgrano. The nuclear-powered attack submarine, a type also known menacingly as a hunter-killer, that year became the first of her kind to fire in anger. The Belgrano was sent to bottom in short order, her ancient hull rent by two torpedoes: 323 men, many of them young conscripts, died. The Falklands war began in earnest that day, May 2 1982.

But the ship now in the crosswires was not the Belgrano. This was August, almost two months after the liberation of the Falklands, and on the other side of the world, in the Barents Sea, backyard of the mighty Soviet Northern Fleet. Conqueror was sailing as close to Russian territorial waters as was legally allowed — or maybe closer. Submariners, a tight-knit community, politely disdainful of their surface counterparts, joke that there are two types of naval vessel: submarines and targets. Wreford-Brown’s target was a spy trawler — an AGI in Nato parlance, meaning Auxiliary General Intelligence. Crammed with interception and detection equipment, they were a ubiquitous presence during the Cold War, shadowing Nato exercises or loitering off naval bases.

This one was special: Polish-flagged, she was pulling a device long coveted by the British and Americans, a two-mile string of hydrophones known as a towed-array sonar. It was the latest thing in Soviet submarine-detection technology and Conqueror’s job was to steal it. To do so, the bow was equipped with electronically controlled pincers, provided by the Americans, to gnaw through the three-inch-thick steel cable connecting it to the trawler. The name of this audacious exercise in piracy? Operation Barmaid.

October 10, 2012

Is “national security” just another term for “protectionism”

Filed under: Business, Cancon, China, Government, Technology — Tags: , , , — Nicholas @ 10:16

Daniel Ikenson at the Cato@Liberty blog:

Chinese telecommunications companies Huawei and ZTE long have been in the crosshairs of U.S. policymakers. Rumors that the telecoms are or could become conduits for Chinese government-sponsored cyber espionage or cyber attacks on so-called critical infrastructure in the United States have been swirling around Washington for a few years. Concerns about Huawei’s alleged ties to the People’s Liberation Army were plausible enough to cause the U.S. Committee on Foreign Investment in the United States (CFIUS) to recommend that President Bush block a proposed acquisition by Huawei of 3Com in 2008. Subsequent attempts by Huawei to expand in the United States have also failed for similar reasons, and because of Huawei’s ham-fisted, amateurish public relations efforts.

So it’s not at all surprising that yesterday the House Permanent Select Committee on Intelligence, yesterday, following a nearly year-long investigation, issued its “Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE,” along with recommendations that U.S. companies avoid doing business with these firms.

But there is no smoking gun in the report, only innuendo sold as something more definitive. The most damning evidence against Huawei and ZTE is that the companies were evasive or incomplete when it came to providing answers to questions that would have revealed strategic information that the companies understandably might not want to share with U.S. policymakers, who may have the interests of their own favored U.S. telecoms in mind.

It’s not just the United States, either: Canada is also getting wary of Huawei.

The Canadian government has said that it will be invoking a “national security exemption” as it hires firms to build a secure network, hinting that Chinese telco Huawei could be excluded.

The exemption allows the government to kick out of the running any companies or nations considered a security risk, which coming in the wake of the US report earlier this week labelling Huawei and ZTE as security threats, strongly indicates they’re out of the bidding.

Prime Minister Stephen Harper’s top media spokesman refused to say for sure whether the government had Huawei in mind when invoking the exemption.

“The government is going to be choosing carefully in the construction of this network and it has invoked the national security exception for the building of this network,” he said, according to the Calgary Herald.

October 7, 2012

Russian intelligence agencies and the Soviet inheritance

Filed under: Europe, Military, Russia — Tags: , — Nicholas @ 10:19

Strategy Page looks at the two main Russian intelligence organizations:

Now there are two foreign intelligence services: SVR and GRU. The first one is the Russian Foreign Intelligence Service. It is the former First Chief Directorate of the Soviet era KGB, which has managed most foreign intelligence operations for decades. Its activities are well known throughout the world.

The second one is the GRU, Russian military intelligence. It is a part of the Defense Ministry. Its full name is much longer (The Chief Intelligence Directorate of the General Staff of the Russian Army). GRU has retained its Soviet era name, and just about everything else. GRU is seen as a living relic of the Soviet times. That is why GRU is so much more secretive than the “Westernized” SVR. GRU officers are considered more patriotic (and old school) than those of the SVR. During the Cold War, there were fewer GRU defectors, still a point of pride in the GRU. GRU prefers to stay in the shadows. Western writers have not written many books about GRU, compared to the KGB. This is largely because GRU keeps its secrets better, and, in the West, is considered an obscure part of Russian intelligence. It’s possible that the GRU activated these sleepers, but for the moment the Germans aren’t talking.

Both GRU (Russian Military Intelligence) and SVR (Russian Foreign Intelligence Service) perform the same functions: Political Intelligence, Scientific and Technical Intelligence (industrial espionage) and Illegal Intelligence. Because of this, the two agencies have a very real rivalry going.

But there was, and remains, one area where only the SVR (and its predecessor, the KGB) participates; running counter-intelligence abroad. This was long a KGB monopoly because it was the KGB’s job to make sure the armed forces remained loyal, and GRU was, and is, very much a part of the armed forces.

Thus when the GRU officers are working abroad, they are monitored by Directorate “K” (counter-intelligence) of the SVR. Those who serve inside Russia are watched by the Directorate of Military Counter-Intelligence (The Third Directorate) of the FSB (Federal Security Service, inheritor to the KGB). Interestingly, in the Soviet period, it was also called the Third Directorate. It is not a coincidence but a continuation of the Soviet tradition. The Third Directorate of the FSB is still assigned to monitor the Defense Ministry, of which the GRU is a part. The head of GRU does not even report directly to the Russian President. GRU reports have to go through the Head of the General Staff and the Defense Minister before reaching the top man. Thus GRU is very much number two in the Russian foreign intelligence business. As Number 2, they tend to try harder, and consider themselves more elite than those wimps over at SVR.

On the other hand, there also is one function monopolized by the GRU; battlefield intelligence. The battlefield intelligence is run in peacetime as well. For example, in preparation for future wars, the GRU sets up illegal weapon and ammunition dumps in the territory of many foreign countries. This is a risky operation. It usually involves groups of junior Russian diplomats secretly going into rural areas to bury rifles, machine-guns and other weapons. They have to do this discreetly and in a hurry, to avoid detection by the local counterintelligence service. It is considered a hard job.

September 2, 2012

The importance of encryption for private citizens

Filed under: History, Liberty, Technology — Tags: , , , , — Nicholas @ 11:26

Wendy McElroy relates one of the earliest examples of private encryption in the young American republic:

In America, the tug of war between privacy and forced access to encrypted data is as old as the nation’s formation. As always, forced access was executed by authorities against individuals.

In 1785, a resolution authorized the secretary of the Department of Foreign Affairs to open and inspect any mail that related to the safety and interests of the United States. The ensuing inspections caused prominent men, like George Washington, to complain of mail tampering. According to various historians, it also led James Madison, Thomas Jefferson and James Monroe to correspond in code. That is, they encrypted their letters to preserve the privacy of their political discussions.

The need for Founding Fathers to encrypt their correspondence is high irony. The intrusive post office against which they rebelled had been established specifically to provide a free flow of political opinion. In the 1770′s, Sam Adams urged the 13 colonies to create an independent postal system because the existing post office, established by the British, acted as a barrier to the spread of rebellious sentiment. Dorothy Ganfield Fowler in her book Unmailable: Congress and the Post Office observed, “He [Adams] claimed the colonial post office was made use of for the purpose of stopping the ‘Channels of publick Intelligence and so in Effect of aiding the measures of Tyranny.’”

Alas, the more government changes, the more oppression remains the same. Soon the Continental Congress itself wanted to declare some types of matter ‘unmailable’ because their content were deemed dangerous. Anti-Federalist letters and periodicals became one of the first types of information to become de facto unmailable. (Anti-federalists resisted centralized government and rejected a Constitution without a Bill of Rights.) During the ratification debates on the Constitution, the Anti-Federalists were unable to circulate their material through the Federalist-controlled post office.

« Newer PostsOlder Posts »

Powered by WordPress