Share This

Showing posts with label Spy. Show all posts
Showing posts with label Spy. Show all posts

Sunday, 17 March 2024

The more thoroughly exposed the CIA's true face, the better

Mother of all disorder Illustration: Liu Rui/GT

Reuters exclusively reported on Thursday that, according to a former US official with direct knowledge of highly confidential operations, then-US president Donald Trump authorized the Central Intelligence Agency (CIA) to launch secret operations on Chinese social media aimed at "turning public opinion in China against its government." Many people don't find this information surprising or even consider it "news." The US is a habitual offender, using various covert means to foment "peaceful evolution" and "color revolutions" in other countries, with the CIA being the main force employed to this end. For other countries, the US' pervasive influence is everywhere, visible and tangible, so there is no need for exposés.

We are still unclear  what the specific purpose of the "former US official" was in leaking the information to Reuters. A CIA spokesperson declined to comment on the existence of the program, its goals or impact. A spokesperson for the Biden administration's National Security Council also declined to comment, which means it was neither confirmed nor denied. The US intelligence community often uses a mixture of false and true information to create confusion, a tactic that was used on Edward Snowden. The Reuters report is valuable, but needs to be further processed to filter out the true and useful parts.

Firstly, this report carries a strong defense of US penetration into China. It portrays the proactive offensive of the US' cognitive warfare against China as a passive counterattack against "cyber attacks" on the US from China and Russia. In reality, portraying themselves as the weak or victimized party and labeling their hegemonic actions as "justice" is a part of the US' cognitive warfare against foreign countries.

One US official interviewed by Reuters even said it felt like China was attacking the US with "steel baseball bats," while the US could only fight back with "wooden ones," showing his exaggerated and clumsy acting skills. The US has never used a "wooden stick." Over the past few decades, the CIA has overthrown or attempted to overthrow at least 50 legitimate international governments. There are also statistics showing that from 1946 to 2000, the US attempted to influence elections in 45 countries 81 times to achieve regime change. As a habitual offender of manipulating public opinions, the US has long established a series of tactics in its targeted propaganda, information dissemination, event creation, rumor fabrication, incitement of public opinion, and media manipulation. It constantly creates new tactics and uses new technologies according to changing circumstances. This is an open secret. The US dressing itself up as a "little lamb" only has a comedic effect, not a propaganda effect.

Next, as the US' intervention and infiltration in other countries are covert operations, this disclosure provides an opportunity for the outside world to glimpse into the specific methods used by the US. For example, the whistleblower admitted that the CIA had formed a small team of operatives, using bogus online identities to spread damaging stories about the Chinese government while simultaneously disseminating defamatory content to overseas news agencies. This corroborates with previous statements by CIA Director William Burns, indicating increased resources being allocated for intelligence activities against China, once again confirming the existence of the US "1450" (internet water army) team targeting China.

The whistleblower admitted that the CIA has targeted public opinion in Southeast Asia, Africa, and the South Pacific region, spreading negative narratives about the Belt and Road Initiative. This indicates that in the US-instigated propaganda war against China, the global public opinion arena, especially in "Global South" countries, is their main strategic target. Various "China threat" theories circulating in third-party countries, as consistently pointed out by China, are all being operated by the US intelligence agencies behind the scenes.

The US has never concealed its hegemonic aims, nor does it regard encroachment on other countries' sovereignty as something to be ashamed of, which is even more infuriating than the hegemonic behavior itself. American economist Jeffrey Sachs criticized the CIA's blatant violation of international law in his commentary last month, stating that it is "devastating to global stability and the US rule of law," leading to "an escalating regional war, hundreds of thousands of deaths, and millions of displaced people." He also criticized the mainstream American media for failing to question or investigate the CIA. In fact, far from acting as watchdogs, mainstream American media has served as an accomplice. How many rumors manufactured by the CIA have been spread through the mouths of mainstream American media? When did they reflect and correct themselves?

We also see that the intentions of the US intelligence agencies are even more sinister. As admitted in the revelations, they aim to force China to spend valuable resources in defending against "cognitive warfare," keeping us busy with "chasing ghosts," and disrupting our development pace. First of all, we appreciate their reminder. At the same time, we will not allow external factors to interfere with our strategic determination to manage our own affairs well. For China and the world, the more fully, clearly, and thoroughly the CIA exposes itself, the deeper people will understand its true nature, and the stronger their ability to discern the truth will become. Keeping the CIA busy to no end or failing in their attempts is the best preventive effect.

Source linkl

How the CIA Destabilizes the World


 

Tuesday, 6 September 2022

Exclusive: Evidence shows US’ NSA behind attack on email system of Chinese leading aviation university

 

U.S. is True Empire of Hacking, Surveillance, Theft of Secrets

 

The US: Empire of Hacking, Surveillance and Theft of Secrets.


As a hacking empire, the US disguises itself as a hacking victim


The email system of a university in Northwest China's Shaanxi Province - well-known for its aviation, aerospace and navigation studies - was found to have been attacked by the US' National Security Agency (NSA), the Global Times learned from a source on Monday.

The Chinese Foreign Ministry responded to the issue at Monday's press briefing, saying that China has lodged a strong protest to the US over NSA's attack and demanded an explanation for it.

On June 22, Northwestern Polytechnical University announced that hackers from abroad were caught sending phishing emails with Trojan horse programs to teachers and students at the university, attempting to steal their data and personal information.

A police statement released by the Beilin Public Security Bureau in Xi'an the next day said that the attack attempted to lure teachers and students into clicking links of phishing emails with Trojan horse programs, with themes involving scientific evaluation, thesis defense and information on foreign travel, so as to obtain their email login details.

To probe into the attack, China's National Computer Virus Emergency Response Center and internet security company 360 jointly formed a technical team to conduct a comprehensive technical analysis of the case.

By extracting many trojans samples from internet terminals of Northwestern Polytechnical University, under the support of European and South Asian partners, the technical team initially identified that the cyberattack to the university was conducted by the Tailored Access Operations (TAO) (Code S32) under the Data Reconnaissance Bureau (Code S3) of the Information Department (Code S) of US' NSA.


TAO is the largest and most important part of the intelligence division of the NSA. Founded in 1998, the main responsibility of TAO is to use the internet to secretly access to insider information of its competitors, including secretly invading target countries' key information infrastructure to steal account codes, break or destroy computer security systems, monitor network traffic, invade privacy and steal sensitive data, and gain access to phone calls, emails, network communications and messages.

The various departments of TAO are composed of more than 1,000 active military personnel, network hackers, intelligence analysts, academics, computer hardware and software designers, and electronics engineers. The entire organizational structure consists of one "center" and four "divisions."

The Global Times learned from the source that the attack was code-named "shotXXXX" by the NSA. Directly involved in the command and action mainly includes the head of TAO, remote operations center (mainly responsible for operational weapons platforms and tools to enter and control target system or network) and infrastructure task division (mainly responsible for development and build a network infrastructure and security monitoring platform for attacks)

In addition, four other divisions were also involved in the operation: the advanced/access network technology division, the data network technology division, and the telecommunications network technology division, which provided technical support, and the requirements and location division, which determined the attack strategy and intelligence assessment.

The Global Times learned from the source that at that time, TAO was headed by Rob Joyce. Born September 13, 1967, he attended Hannibal High School and graduated from Clarkson University with a bachelor's degree in 1989 and Johns Hopkins University with a master's degree in 1993. He joined the NSA in 1989 and served as Deputy Director of TAO from 2013 to 2017. He began serving as Acting US Homeland Security Advisor in October 2017. From April to May 2018, he served as the State Security Advisor to the White House, and then returned to the NSA as the Senior Advisor to the Director of Cybersecurity Strategy of the NSA. He now serves as the Director of Cybersecurity.

The investigation also found that in recent years, TAO has conducted tens of thousands malicious attacks against targets in China, controlling large numbers of network devices (web server, internet terminals, network switches, telephone switches, routers, firewalls, and etc.) to steal a high value of more than 140 GB of data.

Technical analysis also found that TAO had acquired the management authority of a large number of communication network equipment in China with the cooperation of several large and well-known internet enterprises in the US before the attack began, which made it easy for the NSA to continuously invade the important information network in China.

Aiming at Northwestern Polytechnical University, TAO used 41 types of weapons to steal the core technology data including key network equipment configuration, network management data, and core operational data. The technical team discovered more than 1,100 attack links infiltrated inside the university and more than 90 operating instruction sequences, which stole multiple network device configuration files, and other types of logs and key files, the source said.

It was found that 13 people from the US were directly involved in the attack and more than 60 contracts and 170 electronic documents that the NSA signed with American telecom operators through a cover company to build an environment for cyberattacks, according to the source.

The Global Times also learned from the source that TAO has used 54 jumpers and proxy servers in the network attack against Northwestern Polytechnical University, which were mainly distributed in 17 countries such as Japan, South Korea, Sweden, Poland and Ukraine, 70 percent of which are located in the countries surrounding China, such as Japan and South Korea.

Apart from the cyberattack, the US has also conducted surveillance of Chinese mobile users, illegally stealing their text messages and wirelessly locating them, which seriously endangered China's national security and violated the personal data security of its nationals, Chinese Foreign Ministry spokesperson Mao Ning said on Monday, urging the US to immediately stop its wrongdoings.

"What I want to stress it that, cyberspace security is a common problem faced by all countries worldwide. The US, with the world's most powerful cyber technology, should refrain from using such advantages to steal secrets from other countries, and should instead participate in global cyberspace governance in a responsible manner, and play a constructive role in maintaining cybersecurity," Mao said.

For a long time, the NSA has been carrying out secret hacking activities against China's leading enterprises in various industries, governments, universities, medical institutions, scientific research institutions and even important information infrastructure operation and maintenance units related to the national economy and people's livelihood.

A latest cybersecurity report released by Anzer, a cybersecurity information platform, on June 13 showed that the US military and government cyber agencies have remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days, which are becoming a major source of intelligence for the US and other "Five Eyes" countries.

a new vulnerability attack weapon platform deployed by the NSA, which experts believe is the main equipment of TAO, and it targets the world with a focus on China and Russia. The US' move raised wide suspicions that the country might be preparing for a bigger cyberwar, experts noted. 

 
 
RELATED ARTICLES

Wednesday, 19 January 2022

Too obsessed with James Bond movie! MI5 makes up a James Bond film script

 

Daniel Craig as James Bond Photo:VCG

 


Too obsessed with James Bond movie! Spokesperson slashes UK MI5's report of China agent

` MI5 recently issued a warning to MPs, claiming Christine Lee, a woman of Chinese origin, has been working as a spy on behalf of the Communist Party of China with the aim to infiltrate Parliament to interfere in UK politics. Some MPs immediately followed suit to hype the "China threat." MP Tom Tugendhat, chair of the Foreign Affairs Select Committee, said "the challenge from Beijing is increasing." Meanwhile, Conservative MP and former party leader, Iain Duncan Smith, called for Ms Lee to be deported and demanded the government make a statement to the House.

` MI6 is famous around the world because of the James Bond films. MI5 is a brother department of MI6. Ken McCallum, the current director general of MI5, was given the nickname "007" by his teammates before he took office in April 2020. In his annual threat update for 2021, he warned that the activities of China, Russia and other "hostile states" could have as large an impact on the public as terrorism. This is just the epitome of how deeply he is poisoned by McCarthyism.

` MI5 is not satisfied with some general remarks, and has made up a real-life 007 script. But in this fiction, almost all the accusations against Ms Lee come from nowhere. It can only use the lobbyist activities that are widely accepted in the West as "concrete evidence." Even Home Secretary Priti Patel said stronger laws were needed since Ms Lee's activity was "under the criminal threshold." However, the British Parliament has launched smear campaign against Ms Lee. It is a shame for the British rule of law to judge before trial.

` Maybe those MPs are also fans of James Bond films. They cannot wait to tell the sensational story after MI5 made a script, in disregard of what the truth is. Perhaps Duncan Smith subconsciously thought Ms Lee is Chinese and so he called for deporting her. However, Ms Lee is a British national and founder of a law firm with offices in London.

` It is worth mentioning that Ms Lee was honored as one of No 10's "Points of Light" by former British prime minister Theresa May for her work to promote interactions between Chinese communities and other communities in the country. By MI5's standards, an employee of Western government or company working in China could be a suspicious spy if he or she treats a Chinese friend to a meal, and many Westerners in China would thus be defined as "agents" or "proxies."

` In this farce starring MI5 and some MPs, any person with a Chinese-like face is suspicious who may be up to something bad against Britain. They repeatedly targeting the ethnic minorities, which is essentially a racial discrimination stemming from the mentality that "those who are not of our kind have different hearts." The box office of such a film with a preset standpoint and far-fetched narrative will be a disaster. However, this will inevitably have a negative impact on society when it is widely spread by the British media.

` The individuals, companies and organizations that are devoted to promoting China-UK friendship and cooperation will be the first victims. Taking down Ms Lee will intimidate others who are rational on China-UK relations. Anti-China politicians will have more space to maneuver - and they don't care if such moves will harm Britain's own interests. In recent years, there has been a significant increase in hate crimes against Asians in the UK, which is also a manifestation of the negative consequences of anti-China sentiment.

` Chinese Foreign Ministry spokesperson Wang Wenbin said on Friday that China hopes that relevant British officials will refrain from making groundless remarks, let alone hyping the "China threat theory" for ulterior political purposes. China has no need to interfere in the UK, and China will not do so. The cooperation between China and the UK in many areas in the past few years is a natural result of the two countries' common interests. It is not by buying off one or two members of parliament. Isn't it a humiliation to their national status and power to fabricate the logic that China can interfere in UK politics by buying off MPs?

` In the past two years, MI5 has come to resemble the CIA. It serves more of Washington's strategic needs while doesn't even care taking Britain into the trenches. Britain has always said it has an "independent diplomacy." Now is the time to test that

Source link

RELATED ARTICLES
 

 Related post:

 

The new James Bond film is nostalgia of a declining empire

Friday, 3 September 2021

Pakatan’s dependency on dubious NED funding, Suaram

Suaram adviser questions Pakatan Harapan's funding from the National Endowment for Democracy

https://www.thestar.com.my/news/nation/2021/08/30/suaram-adviser-questions-pakatan-harapan039s-funding-from-the-national-endowment-for-democracy


MALAYSIAN CIVIL SOCIETY MUST SEVER NED FUNDING TO BE CREDIBLE ( by Kua Kia Soong, SUARAM Adviser, 30.8.2021)

It is painful to watch Malaysian NGOs squirming their way out of justifying NED funding for their activities. The NGO I belong to, SUARAM used to receive funding from the National Endowment for Democracy (NED) until the organisation was exposed as a CIA “soft power” front for the US government several years ago. Knowing the blood-drenched “regime changing” record of th...

Lihat Lagi  https://www.facebook.com/kiasoong.kua/posts/3761531817280035

  

https://youtu.be/DPt-zXn05ac 

'We lied, we cheated, we stole', ‘the Glory of American experiment’ by US former Secretary of State/Ex-CIA director Mike Pompeo 

 


PETALING JAYA: Pakatan Harapan should explain its dependence on funding from the National Endowment for Democracy (NED), says Suara Rakyat Malaysia (Suaram) adviser Kua Kia Soong.Inside America's Meddling Machine: NED, the US-Funded Org Interfering in Elections Across the Globe “It is up to Pakatan Harapan to explain their dependence on NED funding if they can,” he said in a statement on Facebook yesterday.

Daniel Twining, the president of the International Republican Institute (IRI) revealed three years ago that they – through NED – had been funding the Opposition in Malaysia since 2002.

NED is a non-governmental organisation in the United States that was founded in 1983 for promoting democracy in other countries by developing political groups, trade unions, deregulated markets and business associations.

Twining allegedly told a forum in 2018 that the IRI, with funds from the NED, had worked to strengthen Malaysian opposition parties and its efforts paid off when Pakatan Harapan won the 14th General Election.

Kua also urged all NGOs in the country to stop accepting funds from NED to remain credible.

Kua said Suaram used to receive funding from the NED until the organisation was exposed as a CIA “soft power” front for the US government several years ago.

“Knowing the blood-drenched ‘regime changing’ record of the CIA in so many third world countries since 1947, we could not continue receiving funds from such a dubious source for our own credibility.

Source link

 

Related:

 

Suaram adviser questions Pakatan Harapan's funding from ...

 

Suaram adviser questions Pakatan Harapan's funding from ...

 

Related posts:

 

  Botched Afghan retreat reveals an America struggling to contain China ` Unable to better China in positive 
 
‘Use science, not politics’   China is concerned that the so-called US intelligence report on the origins of the coronavirus will contain p...
 

Saturday, 2 November 2013

NSA secretly hacks, intercepts Google, Yahoo daily

The United States’ National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers worldwide. That’s according to documents released by former NSA contractor, Edward Snowden, The Washington Post reports.

Video: NSA intercepts Google, Yahoo traffic overseas report | The National
 http://shar.es/IxZIJ



According to the documents, the agency and its British counterpart GCHQ, through a project called MUSCULAR, collected data stored on Google and Yahoo servers. That allowed both governments access to hundreds of millions of user accounts from individuals worldwide.

“From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants,” RT cites the Post’s Barton Gellman and Ashkan Soltani.

A January 9th document says that in the preceding 30 days, collectors had processed over 181 million pieces of information, including both metadata and the actual contents of communications.

The government can already request information from phone or data through the FISA Amendments Act but this data collection would ostensibly take place without Google and Yahoo even being aware of it.

When you send email or store files with an internet company, that data is regularly shared among servers around the world, in order to ensure quick access to your information from wherever you happen to be. Google and Yahoo run customized private networks to shuttle that information around, passing between and within countries, as the Post indicates in a graphic. To move that information, the companies use fiber optic connections, light-speed networks running over thin glass cables. According to the Post, it’s those connections that the NSA is able to monitor. None of Yahoo’s inter-server traffic is encrypted. Not all of Google’s is either.

The MUSCULAR program, according to Wednesday’s leak, involves a process in which the NSA and GCHQ intercept communications overseas, where lax restrictions and oversight allow the agencies access to intelligence with ease.

“NSA documents about the effort refer directly to ‘full take,’ ‘bulk access’ and ‘high volume’ operations on Yahoo and Google networks,” the Post reported. “Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner”.

The Post points out that company staffers were surprised and angry to hear that their their networks had been compromised. Google said that it was “troubled by allegations of the government intercepting traffic between our data centers”.

The report comes amid a storm of protest about NSA surveillance both at home and overseas of phone and Internet communications.

On Tuesday, US officials said reports that American spy agencies snooped on millions of Europeans were false.

Alexander told lawmakers that in many cases European spy agencies had turned over phone records and shared them with US intelligence.

Related posts:

1. USA Spying, the Super-Snooper ! 
2. Abusing intelligence is stupid
3. Upset over US cyber spying!
4.US Spy Snowden Says US Hacking China Since 2009 
5.US building new spy wing to focus on Asia 

Thursday, 31 October 2013

USA Spying, the Super-Snooper !


The United States is running clandestine communications intelligence facilities at its embassies in Kuala Lumpur, Jakarta, Bangkok, Phnom Penh and Yangon.

The country is doing so by tapping telephones and monitoring communications networks from electronic surveillance facilities in US embassies and consulates across east and south-east Asia, according to information disclosed by intelligence whistleblower Edward Snowden.A top secret map dated August 13, 2010 lists nearly a hundred surveillance facilities worldwide, the map however, shows no such facilities are located in Australia, New Zealand, Britain, Japan and Singapore – the US’s closest allies.

Snoopy the Snooper

According to the map published by Germany’s Der Spiegel magazine today, a joint Central Intelligence Agency (CIA) – National Security Agency (NSA) group known as ” Special Collection Service” conducts the sweeping surveillance operation, as well as clandestine operations against specific intelligence targets.The map, which was initially published in full on Der Spiegel‘s website but subsequently replaced with a censored version, lists Special Collection Service facilities at 90 locations worldwide, including 74 manned facilities, 14 remotely operated facilities and two technical support centres.

The map confirms the global reach of US signals intelligence operations with special collection facilities located in most major capitals on every continent.Read the full story here


By Hanin Fadiyah@www.harakahdaily.com

Related posts:
1. Abusing intelligence is stupid
2. Upset over US cyber spying!
3.US Spy Snowden Says US Hacking China Since 2009 
4.US building new spy wing to focus on Asia 

Sunday, 29 September 2013

Abusing intelligence is stupid


Governments that deliberately pervert their spy agencies are shooting themselves in the head.

ALL countries operate spy agencies, so some of their practices and experiences are universal.

Governments deem intelligence services to be useful, even necessary, in evaluating and anticipating events – so they are earnestly nurtured and cultivated. However, whether and how far these services actually contribute to policymaking depends on a multitude of variable factors.

The capacity of a “secret service” derives from the scale of its available resources – human, financial, technical, etc.

The richer a country the greater the means for developing its intelligence service, and the more powerful a country the greater its need or purpose for doing so.

Yet that need not mean that a richer or more powerful country would have a more competent intelligence service.

Unlike conventional institutions such as the armed forces, the critical criteria cannot be the strength of numbers or the expanse of field coverage.

Since the quality of information handled is key, spy agencies perform like a scalpel where other security institutions act like meat cleavers.

At the same time, all of them need to be coordinated and concerted through optimised complementarity.

Conceptually, the intelligence services are highly professional institutions performing specialised tasks in the national interest.

In discharging their duties, they must observe laws and conventions that guide and limit their clandestine activities.

In practice, however, they are often politicised in the perceived interests of specific administrations.

This compromises their credibility, debases their status and subverts their effectiveness.

Another universal experience, regardless of a country’s developed or developing status, is that the intelligence services are boosted in times of great national distress.

Trying times are also the best times to stretch and test their capacities.

Britain’s Secret Intelligence Service (SIS), for example, originated in the Secret Service Bureau established in 1909.

This was a joint effort of the War Office and the Admiralty, with a focus on Imperial Germany.

The impetus for the service developed with the exigencies of two world wars.

In the United States, the demands of wartime intelligence in the early 1940s resulted in the creation of the OSS (Office of Strategic Services) to coordinate information streams from the armed forces.

The OSS would later morph into the CIA (Central Intelligence Agency), technically the first US spy agency.

The United States until then did not have a centralised intelligence agency, so the CIA emerged to fill the gap.

As it was with the SIS, the existence of the CIA was not officially acknowledged until decades later. But what began as a fledgling effort requiring British inputs soon ballooned into a US intelligence community comprising no less than 16 spy agencies.

Intelligence agencies tend to have a civilian (police) or military character depending on the needs of the state at the time. Nonetheless, their constant is the primary purpose of protecting the state.

The early Soviet Union felt it needed to guard against counter-revolution, and so established the Cheka secret police under the Ministry of Internal Affairs.

The Cheka then underwent several transformations to become the NKVD, which in turn experienced further transformations to become the KGB of Cold War lore, in the process picking up military elements in the world wars.

The Malayan Emergency (1948-60) was a domestic insurgency that exercised the resources of the police force.

The police department that focused on vital intelligence gathering was the Special Branch, evolving under British tutelage during the colonial period and developing further upon Malayan independence.

Currently, all national intelligence agencies combine human (Humint) and signals (Sigint, or telecommunications interceptions) intelligence.

The latter comprises communications between individuals (Comint) and electronic intelligence (electronic eavesdropping, or Elint) that favour countries with bigger budgets because of the costs incurred in technology and expertise.

However, while a common strength lies in surveillance or information-gathering, analysis and interpretation of the information so gathered often fail to keep pace.

Where analytical deficits occur, political interests often exploit these spaces to pervert the course of intelligence gathering.

At the same time, the quality of intelligence is sometimes patchy where official links are weak.

Britain’s SIS was thus handicapped in Germany during the First World War, just as US intelligence services are now hampered in Iran and Syria as they were in Saddam Hussein’s Iraq.

The problem is compounded when governments refuse to acknowledge their inadequacies and prefer to give their own dubious capacities the benefit of the doubt.

The mistake often lies in equating overwhelming military superiority with operational success requiring sound intelligence.

And so regime change in Iraq was described as a “cakewalk” and a “slam dunk”, with unanticipated difficulties emerging once the plan was operationalised.

A similar development almost occurred in Syria upon underestimating President Bashar al-Assad’s effective control.

Hyper-intelligence combines the prowess of two or more ally countries’ intelligence services, taking spying to a whole new level.

The US-British “special relationship” is one such example, only that it is more than bilateral collaboration.

What began as a post-war agreement between London and Washington in 1946 soon encompassed the other English-speaking countries of Canada, Australia and New Zealand in the UKUSA (United Kingdom – United States of America) Agreement.

Focusing on but not limited to Sigint, this “Five Eyes” pact formalises the sharing of intelligence on other countries that any of the five spies upon.

Earlier this month, a leak by former US intelligence operative Edward Snowden revealed that the UKUSA Agreement goes further than these five Western countries. It effectively and routinely includes Israel as well.

The National Security Agency (NSA) reputedly runs the most extensive intelligence gathering operation for the United States.

Its global reach is shared with the largest unit in the Israel Defense Force, the NSA-equivalent Unit 8200 (or ISNU, the Israeli Sigint National Unit), in unfiltered form.

That means anything and everything that the United States and/or the other “Five Eyes” countries knows about the rest of the world from spying are known by Israel as well.

It explains Washington’s determination to “get Snowden” – not only are the leaks embarrassing, they discourage other countries from engaging the United States in security cooperation.

The other problem is no less serious: politicisation, which corrupts and perverts otherwise professional and competent intelligence services.

This amounts to blowback, a CIA-originated term meaning self-inflicted policy injury.

It (in)famously occurred when the US-British axis that invaded Iraq built its rationale on the lie that Saddam had stockpiled “weapons of mass destruction” (WMDs) – even when whatever little intelligence there was had indicated that Iraq had dismantled WMD facilities years before.

It happened again when Washington insisted that Assad was responsible for chemical weapons attacks in civilian areas.

Not only had Russian intelligence and UN inspectors found anti-Assad rebels culpable instead, but both German and Israeli intelligence had privately cleared Assad of those charges.

The inside information available to diplomats had cast such doubt on the US allegations that US-friendly countries such as Singapore refused to accept Washington’s version at the UN.

Politics had dictated that the United States stick with its allegations, just as politics had dissuaded Israeli policymakers from correcting misinterpretations of intelligence data wrongly blaming Assad.

Fiddling with intelligence for some passing gratification such as attacking an adversary may seem tempting, but dumbing down vital strategic data is a dangerous and costly exercise. It is also an act of singular and self-defeating stupidity.

Contributed by  Behind The Headlines: Bunn Nagara
> Bunn Nagara is a Senior Fellow at the Institute of Strategic and International Studies (ISIS) Malaysia.
>The views expressed are entirely the writer's own.

Related posts:
Upset over US cyber spying!
US Spy Snowden Says US Hacking China Since 2009 - Rightways 
Technologies: No privacy on the Net ! 
US building new spy wing to focus on Asia
Flawed perception remembering Heroes and Zeroes