Aller au contenu
AIR-DEFENSE.NET

Les services de renseignements dans le monde


IDF
 Share

Messages recommandés

Opex360 a repris l'article :

http://www.opex360.com/2019/10/24/le-renseignement-chinois-sinteresserait-de-tres-pres-aux-militaires-affectes-en-bretagne/

@Rob1 @jojo (lo savoyârd)«La Chine recourt à l’espionnage pour prendre la tête du leadership technologique» mondial»

Antoine Izambard, journaliste et auteur de «France-Chine. Les liaisons dangereuses» (Stock), explique les différentes méthodes employées par la Chine pour imposer au monde sa puissance dans une vidéo de 16 minutes. En bref, si tout le monde espionne toute le monde, on hésite à se heurter frontalement à la Chine sur le sujet :

http://video.lefigaro.fr/evene/video/la-chine-recourt-a-l-espionnage-pour-prendre-la-tete-du-leadership-technologique-mondial/6093711460001/

 

Modifié par collectionneur
  • Upvote (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

Il y a 19 heures, collectionneur a dit :

Opex360 a repris l'article :

http://www.opex360.com/2019/10/24/le-renseignement-chinois-sinteresserait-de-tres-pres-aux-militaires-affectes-en-bretagne/

@Rob1 @jojo (lo savoyârd)«La Chine recourt à l’espionnage pour prendre la tête du leadership technologique» mondial»

Antoine Izambard, journaliste et auteur de «France-Chine. Les liaisons dangereuses» (Stock), explique les différentes méthodes employées par la Chine pour imposer au monde sa puissance dans une vidéo de 16 minutes. En bref, si tout le monde espionne toute le monde, on hésite à se heurter frontalement à la Chine sur le sujet :

http://video.lefigaro.fr/evene/video/la-chine-recourt-a-l-espionnage-pour-prendre-la-tete-du-leadership-technologique-mondial/6093711460001/

 

Celà fait un bail que la Chine a mis en place, et en œuvre, un système global de collecte de renseignements et de prises d'influences tous azimuts, et par tous les moyens dont-elle peut disposer (technologiques, humains, universitaires, économiques, politiques ...). C'est pratiquement une "institution", personne n'est dupe mais c'est très compliqué de s'en prémunir car c'est une pratique intégrée, insidieuse et multifacette, très bien rôdée, aux intérêts souvent croisés. Bref souvent bien embarrassant pour les organismes ciblés (pour ceux ayant des doutes ou des éléments) qui essayent plutôt de tuer la poule dans l'oeuf que d'affronter de face le problème (raisons diplomatiques ou d'ordre interne).

Le moyen "humain", aussi vieux que la Chine elle-même ou que le monde si on veut, est l'un de ces moyens mis en œuvre par la Chine, pratique dont-elle excelle.

Les (jolies) jeunes chinoises, instruites et intelligentes, ont la côte en Occident ... Expatriées, certaines d'entre-elles (à leur initiative ou même à leur insus) peuvent se transformer en de très efficaces collecteurs de renseignements dans les pays qui les accueillent. Les jeunes diplômées (& diplômés), sortis des filières chinoises et qui entreprennent un cursus en Occident, en plus d'avoir d'excellents niveaux et d'excellentes capacités d'intégration sociale (vie personnelle comme professionnelle), ont toutes et tous un haut degré de sentiments patriotiques bien cultivé en amont, souvent tenu discret. Bref, chacun d'entre-elles (eux), affiche un excellent taux de prédisposition en cas de besoin pour ...

Le problème étant de faire le tri sans devenir parano ... (entre celles et ceux qui ne sont pas concernés, celles et ceux qui pourraient l'être, et celles et ceux qui le seraient).

La technique chinoise est la technique de la pêche passive : on envoie des contingents d'étudiants(es), traductrices (traducteurs), scientifiques ... à l'aide de bourses, subventions (etc) dans des zones et domaines d'intérêts au sein de pays tiers, et on laisse mordre (appâts / hameçons). Sur le nombre, comme des bouchons floteurs jetés à l'eau, il y a les probabilités ... Les appâts sont-eux conscients ou non de leur possible utilisation.

Autre technique avec les mêmes appâts : on "téléguide" vers une cible. Les appâts sont de fait acteurs actifs et "missionnés".

Le succès de ce genre de moyens humains (entre-autres) de collecte n'est plus à démontrer.

 

 

Il y a 21 heures, rogue0 a dit :

Pour lever le doute si c'est une stratégie organisée  ou pas (comme le recrutement de sources via linkedin) , il suffirait de regarder si cette tendance touche aussi les chantiers naval US, ou les écoles militaires US.
Même si les signaux seront plus diffus, vu qu'il y a beaucoup plus d'asiatiques, et d'étudiants chinois aux US.

Ne soyons pas naïfs ! :wink:

  • Merci (+1) 2
  • Upvote (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

A prendre avec les pincettes de rigueur

https://www.ridl.io/en/why-the-kremlin-can-t-keep-its-chekists-in-check/

Un avis sur les guéguerres internes au FSB, qui apparaissent brièvement quand des hauts responsables sont coffrés pour "corruption" :

y avait d'ailleurs eu 2 responsables arrêtés au FSB peu après les fuites sur les piratages russes pour faciliter l'élection de Trump ... ça alimente le moulin à rumeur.
Je ne m'y connais pas assez sur les factions silovki russes pour trancher.

  • Merci (+1) 1
  • Upvote (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

En rapports avec les approches des militaires français ce soir sur france inter rediffusion à 23hoo:

Permis de séduire - Rendez-vous avec X

https://www.franceinter.fr/emissions/le-nouveau-rendez-vous-france-inter/le-nouveau-rendez-vous-france-inter-28-octobre-2019

On les appelait les "Roméos". C'est un journaliste occidental qui les avait baptisés ainsi... Des agents est-allemands chargés de séduire des  secrétaires de l'Ouest, en RFA, et de les faire travailler pour les services secrets de l'autre Allemagne, la RDA.

Une entreprise très fructueuse qui a permis au camp de l'Est, à l'époque de la Guerre froide, de glaner quantité de renseignements ultra-confidentiels. Car ces secrétaires étaient effectivement choisies en fonction de leurs attributions : assistantes de ministres ou d'hommes politiques, par exemple.

Le personnage qui a présidé à cette importante opération n'est autre que Markus Wolf, le patron des services de renseignement est-allemand, l'un des espions les plus doués de son temps et qui aurait, prétend-on, servi de modèle à John Le Carré pour son personnage  de Karla, l'ennemi impitoyable de son héros, George Smiley.

C'est lui qui "recruta" Gabriele Gast en 1975

En lançant à travers la RFA ses Roméos, Wolf n'a fait au fond qu'adapter le système soviétique des "hirondelles"... Ces femmes de peu de vertu chargées de piéger les diplomates et agents occidentaux en poste en URSS selon une méthode éprouvée depuis longtemps dans le monde de  l'espionnage... On séduit, on couche. Et les complices photographient. A moins qu'un supposé conjoint n'arrive à l'improviste et menace l'imprudent de provoquer un scandale. Ainsi fut pris au piège un ambassadeur de France à Moscou qui a eu ensuite bien du mal à s'en sortir et s'est attiré cette remarque cinglante du général de Gaulle :

Alors Dejean, on couche ! 

Lien vers le commentaire
Partager sur d’autres sites

Je viens de voir que l'Association of Former Intelligence Officers (AFIO) a édité un guide pour l'étude du renseignement il y a quelques années, consultable (mais pas téléchargeable -- ou alors dites-moi si j'ai raté quelque-chose) en ligne : https://www.afio.com/40_guide.htm

Lien mis sur l'article "renseignement" de wiki.

  • Merci (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

  • 2 weeks later...

Échange de deux espions russes contre un norvégien et un lituanien a la frontière de l'enclave de Kaliningrad, c'est une première du genre entre ces trois pays :

https://www.lemonde.fr/international/article/2019/11/15/la-lituanie-et-la-norvege-echangent-des-espions-avec-la-russie_6019346_3210.html

Lien vers le commentaire
Partager sur d’autres sites

  • 2 weeks later...

Dépilage de mes notes :

A propos des communications percées du FBI:

la tache des SR russes était relativement facile :

Après vérification, le protocole de communication APCO P25 utilisé par les services d'urgence US et le FBI (équivalent du TETRA européen) avait d'énoorrrrrrrrmes failles de sécurité (connues de la communauté open source depuis 10 ans).
De plus, le matos n'était pas user-friendly, au point qu'il était difficile de savoir si on émettait en clair ou en "chiffré".
https://en.wikipedia.org/wiki/Project_25#Security_flaws

https://en.wikipedia.org/wiki/Terrestrial_Trunked_Radio#Comparison_between_TETRA_and_Project_25

https://www.schneier.com/blog/archives/2019/09/russians_hack_f.html

https://www.mattblaze.org/papers/p25sec.pdf

Voilà quelques tutoriaux publics pour les déchiffrer (sic)

https://www.rtl-sdr.com/rtl-sdr-radio-scanner-tutorial-decoding-digital-voice-p25-with-dsd/https://twitter.com/ncweaver/status/1173615135207723008
 

Révélation


Le 16/09/2019 à 13:11, rogue0 a dit :

Mauvaise passe pour le contre espionnage US.

Gros scoop à prendre avec des pincettes, et à vérifier

Les communications du contre-espionnage US (le FBI) auraient été compromises vers 2011 par les SR russes.
https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html?soc_src=hl-viewer&soc_trk=tw&guccounter=1

A priori, cela aurait concerné d'abord les radios / GSM utilisés pour la coordination des équipes de surveillance sur le terrain...
Mais d'autres systèmes auraient été compromis par le suite.

Ce serait un gros coup en SIGINT ... et totalement légitime (toute puissance tente de le faire).
Et cette opération était en partie conduite via les complexes diplomatiques russes aux US, fermés en 2016 (officiellement en représaille pour les ingérences électorales russes).

Le 17/09/2019 à 19:38, Rob1 a dit :

NBC News sort un article de son côté. Pour eux, il n'y a pas de signe que les communications aient été décryptées contrairement à ce que disait Yahoo, mais l'analyse du trafic et sa localisation auraient été suffisamment gênants : https://www.nbcnews.com/politics/national-security/russian-spies-u-s-collected-encrypted-fbi-radio-traffic-huge-n1055001

BBC Russia a des éléments sur l'ex-agent de la CIA près de Poutine, et c'est assez saignant :

Le grand jeu est plus actif que jamais.


 

 

  • J'aime (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

Opération contre le GRU qui se servait de la Haute-Savoie comme escale pour ses opérations ''homo''. Une quinzaine d'agents démasqués (mais pas d'arrestation) :

Message mit également dans le fil Russie

https://www.lemonde.fr/international/article/2019/12/04/la-haute-savoie-camp-de-base-d-espions-russes_6021648_3210.html

Pour rappel, au début des années 1990, on avait trouvé au moins une cache d'armes des services soviétiques dans la région lors de travaux (je pense que c'était pour une autoroute). Un journal spéculé qu'il s'agissait d'une planque pour les Spetnaz

  • J'aime (+1) 1
  • Merci (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

Ici, surtout depuis les années 60 çà grouille ... Et pas que les russes ... Juste,  ces dernières décennies tous étaient plus discrets (parce que c'était devenu "le vert" comme expliqué), les opérations "remuantes" se déroulant maintenant généralement "un peu plus loin" (UE et +), à quelques exceptions près. Ces derniers temps çà bouge un peu ... Ce qui pourrait expliquer une certaine réaction pour calmer un peu tout çà. Je dis çà comme çà, et çà n'engage que moi.

Modifié par jojo (lo savoyârd)
  • Upvote (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

Concernant l’espionnage chinois, l’une de leurs ( nombreuses) techniques, c’est l’approche et le contact de retraités à fort potentiel, je pense notamment à un professeur universitaire de chimie retraité , qui c’est vu retirer son titre de professeur émérite avec interdiction de remettre les pieds dans son ancien labo ; il avait travaillé sur les CMC du m88en collaboration avec le CEA et snecma, ses nombreux voyages en chine pour des colloques ont fini par attirer l’attentions des services de contre espionnage, ça et l’etonnante parenté entre la technique française des composants sous matrice céramique française et celle «  développée « par les chinois.

les chinois qui ne manquent pas d’aplomb, lui ont même donné une médaille pour son apport à la culture et la science chinoise...

Modifié par Capitaineconan
  • Merci (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

Le 06/12/2019 à 23:06, jojo (lo savoyârd) a dit :

Ici, surtout depuis les années 60 çà grouille ... Et pas que les russes ... Juste,  ces dernières décennies tous étaient plus discrets (parce que c'était devenu "le vert" comme expliqué), les opérations "remuantes" se déroulant maintenant généralement "un peu plus loin" (UE et +), à quelques exceptions près. Ces derniers temps çà bouge un peu ... Ce qui pourrait expliquer une certaine réaction pour calmer un peu tout çà. Je dis çà comme çà, et çà n'engage que moi.

Tu parles des quelques mecs dessoudés ces dernières années en Haute-Savoie ? :unsure:

Lien vers le commentaire
Partager sur d’autres sites

il y a 49 minutes, Capitaineconan a dit :

Tu penses à la tuerie de chevaline ?c’est vrai que j’ai toujours pensé ( pure spéculation personnelle) que cette histoire avait un arrière-goût de barbouzerie...

Pas que.

https://www.lepoint.fr/faits-divers/haute-savoie-un-ancien-agent-de-la-dgse-retrouve-mort-crible-de-balles-27-03-2019-2304023_2627.php

Modifié par Teenytoon
Lien vers le commentaire
Partager sur d’autres sites

il y a 11 minutes, Teenytoon a dit :

Ah oui pour cette histoire, pas de doute, c’est la pure barbouzerie

 »OSS 117 Annecy nid d’espions« 

ou à la Gérard de Villiers SAS

 » fondue sanglante à Chambéry « :biggrin:

 

 

 

  • Haha (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

Il semble qu'on n'ait pas encore parlé sur le forum du meurtre à Berlin de Zelimkhan Khangoshvili, un ancien chef rebelle tchétchène, en août dernier. Le meurtrier "présumé" s'est fait arrêter assez connement par la police à proximité, signalé par un témoin qui l'avait vu jeter son vélo, son pistolet et une perruque dans la rivière Spree.

Il avait un passeport russe délivré à une identité qui n'avait aucune existence avant 2015, ce qui sent le vrai-faux passeport fourni par un service secret.

Et Belingcat n'a pas pu s'empêcher :

https://www.bellingcat.com/news/uk-and-europe/2019/12/03/identifying-the-berlin-bicycle-assassin-part-1-from-moscow-to-berlin/

https://www.bellingcat.com/news/uk-and-europe/2019/12/06/identifying-the-berlin-bicycle-assassin-russias-murder-franchise-part-2/

  • Merci (+1) 3
Lien vers le commentaire
Partager sur d’autres sites

Le 08/12/2019 à 04:00, Teenytoon a dit :

Tu parles des quelques mecs dessoudés ces dernières années en Haute-Savoie ? :unsure:

 

Le 08/12/2019 à 14:58, Rob1 a dit :

Il semble qu'on n'ait pas encore parlé sur le forum du meurtre à Berlin de Zelimkhan Khangoshvili, un ancien chef rebelle tchétchène, en août dernier. Le meurtrier "présumé" s'est fait arrêter assez connement par la police à proximité, signalé par un témoin qui l'avait vu jeter son vélo, son pistolet et une perruque dans la rivière Spree.

Il avait un passeport russe délivré à une identité qui n'avait aucune existence avant 2015, ce qui sent le vrai-faux passeport fourni par un service secret.

Et Belingcat n'a pas pu s'empêcher :

https://www.bellingcat.com/news/uk-and-europe/2019/12/03/identifying-the-berlin-bicycle-assassin-part-1-from-moscow-to-berlin/

https://www.bellingcat.com/news/uk-and-europe/2019/12/06/identifying-the-berlin-bicycle-assassin-russias-murder-franchise-part-2/

Toutes ces affaires, avec d'autres, se télescopent ou se croisent ... Ceci même si leurs origines sont distinctes. Certains y ont intérêt, d'autres moins. C'est du billard à bandes. Mais une chose est sûr : tout "le monde" est plus ou moins concerné à des degrés divers, que ce soir en action ou réaction.

Un article bien pondu qui pourrait bien expliquer ce regain d'activité actuel des services aux quatre coins de notre continent, tout comme en Haute Savoie, CQFD :

https://www.atlantico.fr/decryptage/3584344/affaire-d-espionnage-russe-en-haute-savoie-qui-manipule-qui--alain-rodier

Lien vers le commentaire
Partager sur d’autres sites

Quelques trouvailles :

Un podcast sur les polices politiques du bloc de l’est, par un historien français : http://parolesdhistoire.fr/index.php/2019/12/04/83-polices-politiques-du-bloc-de-lest-avec-emmanuel-droit/

Un article sur le fait que l'espionnage ne paie pas... sauf si vous bossez pour les Américains : https://fivethirtyeight.com/features/spying-doesnt-pay-unless-youre-really-good-at-it/

  • Merci (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

Eh bien, les espions chinois ne sont-ils pas discrets :

https://www.liberation.fr/planete/2019/12/15/des-diplomates-chinois-penetrent-par-erreur-dans-une-base-militaire-americaine_1769364

Fin septembre, deux fonctionnaires de l’ambassade de Chine aux Etats-Unis se présentent en voiture à l’entrée d’une base militaire américaine sensible en Virginie, accompagnés de leur épouse. Les gardes, voyant qu’ils n’ont pas l’autorisation d’entrer, leur demandent de faire demi-tour.

Au lieu de cela, ils continuent, sourds aux ordres de s’arrêter qui leur sont donnés. Il faudra qu’un camion de pompiers se mette en travers de leur route pour qu’ils s’immobilisent. Ils expliqueront qu’ils s’étaient perdus en faisant du tourisme, et qu’à cause de leur anglais défaillant, ils n’avaient pas compris les instructions des gardes. Peu convaincues, les autorités américaines ont expulsé les deux diplomates pour espionnage, une première depuis 1987.

Ces derniers mois, plusieurs Chinois détenteurs de passeport diplomatique se sont présentés sans prévenir sur des sites gouvernementaux ou dans des centres de recherche aux Etats-Unis, mais cette intrusion en Virginie, où stationnent des forces spéciales, est la plus spectaculaire. 

 

 

 

Lien vers le commentaire
Partager sur d’autres sites

  • 3 weeks later...
Le 09/02/2019 à 11:20, Rob1 a dit :

Bellingcat continue à torturer lentement le GRU avec l'identification d'un troisième agent apparemment lié à l'affaire Skripal : https://www.bellingcat.com/news/uk-and-europe/2019/02/07/third-skripal-suspect-linked-to-2015-bulgaria-poisoning/

Sur le sujet de "les réseaux sociaux et la surveillance biométrique ont-ils tués les espions ?", voici un gros article très intéressant AMHA.

https://news.yahoo.com/shattered-inside-the-secret-battle-to-save-americas-undercover-spies-in-the-digital-age-100029026.html

recopie de l'article s'il se fait censurer

Révélation

When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014, no one inside that federal agency could have predicted the potential scale and magnitude of the damage. Over the next six months, those hackers — later identified as working for the Chinese government — stole data on nearly 22 million former and current American civil servants, including intelligence officials.

The data breach, which included fingerprints, personnel records and security clearance background information, shook the intelligence community to its core. Among the hacked information’s other uses, Beijing had acquired a potential way to identify large numbers of undercover spies working for the U.S. government. The fallout from the hack was intense, with the CIA reportedly pulling its officers out of China. (The director of national intelligence later denied this withdrawal.)

Personal data was being weaponized like never before. In one previously unreported incident, around the time of the OPM hack, senior intelligence officials realized that the Kremlin was quickly able to identify new CIA officers in the U.S. Embassy in Moscow — likely based on the differences in pay between diplomats, details on past service in “hardship” posts, speedy promotions and other digital clues, say four former intelligence officials. Those clues, they surmised, could have come from access to the OPM data, possibly shared by the Chinese, or some other way, say former officials.

Illustration: Shonagh Rae for Yahoo News

The OPM hack was a watershed moment, ushering in an era when big data and other digital tools may render methods of traditional human intelligence gathering extinct, say former officials. It is part of an evolution that poses one of the most significant challenges to undercover intelligence work in at least a half century — and probably much longer.

The familiar trope of Jason Bourne movies and John le Carré novels where spies open secret safes filled with false passports and interchangeable identities is already a relic, say former officials — swept away by technological changes so profound that they're forcing the CIA to reconsider everything from how and where it recruits officers to where it trains potential agency personnel. Instead, the spread of new tools like facial recognition at border crossings and airports and widespread internet-connected surveillance cameras in major cities is wiping away in a matter of years carefully honed tradecraft that took intelligence experts decades to perfect. 

Though U.S. technical capabilities can collect reams of data, human intelligence remains critical. In 2016, for example, a high-level Russian asset recruited by the CIA confirmed that Russian President Vladimir Putin had personally ordered plans to interfere in the 2016 U.S. presidential election. After fleeing to the United States, that same covert source was forced to relocate because of his digital trail. Without the ability to send undercover intelligence officers overseas to recruit or meet sources face to face, this type of intelligence might all but disappear, creating a blind spot for U.S. policymakers. 

During a summit of Western intelligence agencies in early 2019, officials wrestled with the challenges of protecting their employees’ identities in the digital age, concluding that there was no silver bullet. “We still haven’t figured out this problem,” says a Western intelligence chief who attended the meeting. Such conversations have left intelligence leaders weighing an uncomfortable question: Is spying as we know it over?

Some have tried to address this crisis. Within the last decade, the CIA assembled a diverse group of intelligence personnel to create the Station of the Future — an ambitious Silicon Valley-style startup costing millions and nestled within a diplomatic facility in Latin America where a team of top spies tried to imagine, build and test innovative tools and techniques that could withstand the digital barrage. 

But the project, which has not been previously reported on, was battered by bureaucratic resistance and hollowed out by financial and administrative neglect; it died an unceremonious death over the last few years. What began as a bold experiment was eventually reduced to what other agency officials saw as simply an expensive proposal to design an open-office floor plan for CIA outposts around the world, say two former intelligence officials.

The Station of the Future was just one crack at tackling the challenges wrought by a world defined by pervasive digital footprints, biometric trackers and artificial intelligence — challenges that have bedeviled U.S. intelligence agencies and divided their senior leadership. So serious is the concern about biometric tracking that in late December the Defense Department’s chief intelligence official co-signed a memo, obtained by Yahoo News, advising all military personnel to avoid using consumer DNA kits, noting worries about surveillance, among other security concerns. 

These problems are now being recognized by Congress as well. 

“Very few people, maybe shepherds in rural Afghanistan, don’t leave some form of digital trace today,” Rep. Jim Himes, who leads the House Intelligence subcommittee on advancing technology, told Yahoo News. “And that poses real opportunities in terms of identifying bad guys … but it also poses real challenges [in] keeping our people from being identified.”

Though the FBI and CIA declined to comment, current and former national security officials who spoke with Yahoo News said efforts to address these issues are underway. CIA Director Gina Haspel, who served decades undercover herself, has doubled down in support of sending spies overseas to track “hard targets,” like Russia and Iran.

These changes come at a critical time for the intelligence community. President Trump has made no secret of his disdain for his own intelligence agencies — an attitude underlined by his push to publicly name the anonymous CIA whistleblower whose complaint sparked the ongoing impeachment proceedings. 

Whether the U.S. intelligence agencies will be able to make these radical changes is unclear, but without a fundamental transformation, officials warn, the nation faces an unprecedented crisis in its ability to collect human intelligence. While some believe that a return to tried and true tradecraft will be sufficient to protect undercover officers, others fear the business of human spying is in mortal peril and that the crisis will ultimately force the U.S. intelligence community to rethink its entire enterprise. 

The following account, based on interviews with more than 40 current and former U.S. and Western intelligence officials, reveals previously unreported CIA and FBI cover programs and operations, and details U.S. intelligence agencies’ deep relationship with the private sector in facilitating these efforts. These officials, most of whom requested anonymity to discuss sensitive government matters, also described high-level deliberations within U.S. spy agencies about the digital threat to cover, and how U.S. adversaries are themselves responding to digital pressures and opportunities. Many believe that, despite the numerous benefits provided by technology, the protection of undercover spies’ identities is becoming next to impossible.

“The foundations of the business of espionage have been shattered,” says Duyane Norman, a former senior CIA official and architect of the Station of the Future project. “We haven’t acknowledged it organizationally within CIA, and some are still in denial. The debate is like the one surrounding climate change. Anyone who says otherwise just isn’t looking at the facts.”

The beginning of the CIA’s cover and tradecraft crisis dates back to at least February 2003, when a Muslim cleric known as Abu Omar disappeared off the street in Milan. He didn’t resurface until 2004, when he called his wife from Cairo to tell her about his kidnapping, detention and torture at the hands of the CIA.

Italian investigators, eager to get to the bottom of the audacious abduction on their streets, were later able to track a web of cellphones communicating only with each other in close proximity to the disappearance, leading them to a series of hotel bills, credit card statements and other identifying indicators, according to a 2007 investigation unveiled at an annual hacker conference in 2013. Italian authorities charged 23 Americans, including the CIA’s former Milan station chief, for their roles in the scheme — most in absentia.

While Omar was just one target of the CIA’s aggressive post-9/11 antiterrorism campaign, several former intelligence officials described the Milan operation’s aftermath as a “come to Jesus” moment that revealed just how vulnerable the agency’s operators were to technology. At the time, some undercover officials naively believed that methods like using potato chip bags would mask cellphone signals, and operatives were generally “freewheeling,” according to one former senior intelligence official. In the space of a few short years, the rapid advance of technology, including nascent international surveillance systems, increasingly endangered the CIA’s traditional human intelligence gathering.

Singapore was one example, recall three former intelligence officials. By the early 2000s, the agency ceased running certain types of operations in the Southeast Asian city-state, because of the sweeping digital surveillance there. The Singaporeans had developed a database that incorporated real-time flight, customs, hotel and taxicab data. If it took too long for a traveler to get from the airport to a hotel in a taxi, the anomaly would trigger an alert in Singaporean security systems. “If there was a gap, they’d go to the hotel, they could flip on the TVs and phones and monitor what was going on” in the room of the suspicious traveler, says the same former senior intelligence official. “They had everything so wired.”

“You used to be able to fly into a country on one name and have meetings in another,” recalls this person. “It limited a lot of capabilities.”

The Singaporean Embassy in Washington did not respond to a request for comment.

Illustration: Shonagh Rae for Yahoo News

Those concerns spread to other places, like London, where CCTV cameras are omnipresent, and the United Arab Emirates, where facial recognition is ubiquitous at the airport. Today there are “about 30 countries” where CIA officers are no longer followed on the way to meetings because local governments no longer see the need, given that surveillance in those countries is so pervasive, said Dawn Meyerriecks, the CIA’s deputy director for science and technology, in a 2018 speech.

In the 2000s, the explosion in biometrics — such as fingerprints, facial recognition and iris scans — propelled the conversation forward, according to multiple former intelligence officials. U.S. intelligence agencies concluded that in many parts of the world, within a short time, all alias work would likely become impossible. 

These fears were largely borne out, say former CIA officials — especially in “hard target” countries like China and Iran. But this trend also affected CIA operations in friendlier countries. By 2012, recalls one former official, some officers were temporarily forbidden to travel for missions in the European Union over fear of exposure, due to widespread sharing of airport biometric data between EU member states. “Facial recognition and biometrics make it very difficult to travel in alias,” says Mike Morell, former acting CIA director and host of the “Intelligence Matters” podcast.

The rise in popularity of consumer DNA kits, which allow people to send in samples of their own DNA, is a growing part of the biometrics problem. Even if an undercover operative hasn’t used a consumer DNA kit, it’s highly likely, say experts, that one of their close relatives has. The Pentagon’s Dec. 20 warning to members of the military not to use these kits appears to be partly in response to that threat.

Greg Hampikian, a biologist at Boise State University and a leading DNA expert, says that with the advent of commercial genetic databases, exposing a spy or other covert operative could be as easy as taking a saliva sample from a cigarette butt or a drinking cup. A suspicious foreign government could send the sample in and potentially find out if the person has been operating under an assumed name.

“It’s right out of a spy novel,” he says.

For spy services, biometric data has become a highly valued currency — leading to a widespread and ongoing campaign by the U.S. and its allies, as well as hostile states, to hack into biometric databases from important airports worldwide. The U.S. has spearheaded breaches of its own, successfully hacking biometric data from the Dubai and Abu Dhabi airports, says a former official. Stealing biometric databases is an attractive strategy for other countries as well. In one case, Chinese intelligence successfully hacked into the biometric data from Bangkok’s airport. “The Chinese have consistently extracted data from all the major transit hubs in the world,” says another former senior official.

The Chinese Embassy in Washington did not respond to a request for comment.

Even before the explosion in biometrics, the CIA sought to take advantage of the new digitized era of border control, working with, and training, other allied countries in the mid-2000s on how to use certain software to identify false passports and other forged documentation, say two former officials. But aside from the obvious information-sharing benefits of this arrangement, officials also discussed inserting a secret backdoor into the software that would allow the agency to surveil participating countries’ passport control systems — and to manipulate the program to allow CIA operatives to slip in and out of these countries undetected, the officials say. Something like these alterations was carried out, says one of the officials, with CIA operatives “moving more freely in and out of Middle Eastern countries than they should have been able to.”

CIA officials also concluded that the days of operating under multiple personas in a single country were over, and began moving toward a “one country, one alias” rule. Undercover officers could no longer fly into a country on one passport and use a separate ID to check into a hotel, and all future trips to that country had to be conducted under the same fake identity. “It’s made the work much harder,” says a former senior agency official, who recalled a time when he possessed multiple fake IDs he kept in a safe for use within the country where he was based, as well as fake passport stamps. “You can’t do that now.”

Starting in 2009, the CIA learned an even more devastating lesson when the Iranian intelligence services, looking for a mole that had given up details on Tehran’s nuclear program, uncovered the agency’s web-based covert communication tools. The discovery set off a deadly chain of events, leading to the exposure — and in some cases death — of CIA sources in China and around the world, according to an investigation by Yahoo News in 2018.

The game was changing for undercover officers and their assets. “It’s extremely difficult now to run cover operations when so much is known and can be known about almost everybody,” says Joel Brenner, a former top counterintelligence official. “Now you show up at the border of Russia, they’ve got your high school yearbook out there where you wrote about your lifelong ambitions to work for the CIA. All that stuff is digitized.”

America’s adversaries were also forced to adapt. By the early 2010s, Chinese intelligence operatives started adopting old-school Russian-style tradecraft, like dead drops in the woods or “brush passes,” which involve surreptitiously exchanging objects in a public place, says one former senior intelligence official. “It was unheard of for the Chinese,” says this person. “The conclusion was that they felt the world was too digital and traceable.” 

Illustration: Shonagh Rae for Yahoo News

U.S. officials believed that Chinese intelligence may have shifted to more low- or no-tech methods after cracking the CIA’s covert communications system around this time, or because of training with their Russian counterparts, says this person. Russian intelligence operatives, meanwhile, began shifting their meetings with sources to countries with less sophisticated biometric systems, say two former senior officials, favoring certain Central and South American countries. 

Peru was one such meeting place, says one of these former officials. In the United States, Russian and Chinese intelligence operatives have also transitioned into operating more under their true names, says this former senior official. “The Russians,” says this person, “have moved to traveling in plain sight.”

Nothing — not even the CIA’s most secretive human intelligence gathering programs — has been spared from this digital onslaught.

In the years after 9/11, the CIA invested heavily in sending more officers under nonofficial cover known as NOCs (pronounced “knocks”), who lack diplomatic recognition, into targeted areas, including al-Qaida strongholds, in order to glean on-the-ground information that CIA officers posing as diplomats might have trouble securing. The CIA was responding to lawmakers who slammed the agency for relying too heavily on “embassy cocktail parties” over embedding in extremist groups. The committees “pushed money on us,” recalls a former senior intelligence officer. 

Even so, while Congress pressed the CIA to use more NOCs, who often pose as businesspeople, the intelligence oversight committees were concerned about the officers’ security. In the 2006 Intelligence Authorization Act, the Senate Intelligence Committee demanded a report from the CIA that would address “the emerging threats posed by technological developments to NOC operations.”

By the late 2000s, Congress’s ambitions were dashed. These deep-cover spies working outside the embassies often didn’t speak local languages, their cover identities didn’t make sense and they were often stationed far away from anyone they might try to recruit. The effort was dubbed a “colossal flop,” according to the L.A. Times. It was a “failed multi-billion dollar” program “shot through with waste, fraud, and abuse,” according to a 2015 lawsuit filed by a former NOC.

Top CIA executives tasked a senior agency official in charge of the NOC program to initiate a vast paring back of these types of deployments, and instituted a moratorium on new recruitments — earning the enmity of a generation of CIA officials working under him, fairly or not, say two former senior officials. “Some of the NOCs out there were fat, dumb and happy, taking advantage of being a spy and a businessman,” recalled a former senior official.

In response to this downsizing, the agency searched for cheaper, more flexible alternatives to NOCs, ramping up its use of diversified cover officers, foreign nationals who are recruited to spy for the agency, often in areas where it is difficult for Americans to operate, say four former officials. Described by these officials as a sort of “asset on steroids,” these undercover officers undertake polygraphs and are given limited clandestine training, but are contractors rather than career employees, like NOCs.

Around 2010, the FBI also began experimenting with new ways of maintaining cover, particularly when trying to recruit foreigners on U.S. soil, through a new initiative known as the National Security Recruitment Program, according to five former officials. The FBI program, which has not been previously reported on, involved close cooperation with the CIA’s National Resources Division, the agency’s clandestine domestic operational wing.

The program deployed U.S. officials under very light cover, with false backstories and business cards but lacking online footprints or connections to long-running brick-and-mortar undercover operations. That way, officials could approach individuals who had potentially useful information with some level of plausible deniability. The CIA helped provide funding for the FBI program, and FBI and CIA officials paired up in major American cities. While the program was successful, it was met with bureaucratic pushback and was ended by 2014 amid a turf battle, say former officials.

One roadblock, say former senior officials, was the bureau’s long-standing national program for creating legends — that is, fake backstories and identities — and cover, known as Stagehand. The program, based out of Los Angeles, Chicago, Atlanta and other major American cities, sets up and maintains undercover FBI operations. Stagehand employees purchase cars, rent office space, buy homes, design cover identities for FBI officials, create fake companies and buy real ones, say six former officials. 

The bureau employs former real estate brokers, physicians and dentists, among others, who become FBI agents but can assume their former jobs as needed, recalls a former senior official. “The deepest layer [of cover] might begin years before you even use it,” the official says.

Illustration: Shonagh Rae for Yahoo News

But the program was saddled by bureaucratic red tape and was sometimes “sloppy,” says one former senior official. A second former senior official recalls the closure of an undercover operation based out of a 100-person office space in the San Francisco Bay Area because of “careless activity by FBI employees” and “possible digital compromise.”

In recent years, the bureau has stopped relying on Stagehand for especially sensitive counterintelligence operations because of fears that the entire program has been compromised, says one former senior official. In a 2017 letter to then-FBI Director James Comey, Sen. Chuck Grassley raised concerns about a potential compromise of Stagehand. A whistleblower alleged that “every single investigation or criminal prosecution that involved Stagehand between 2008 and 2011 was compromised, and the identities and sensitive information of FBI undercover agents were disclosed to foreign governments,” wrote Grassley.

A Miami real estate broker who worked with Stagehand and was convicted of embezzling over $60,000 in FBI funds was the source of the potential compromise, according to a 2016 letter from the FBI to Grassley provided by the senator’s office to Yahoo News. As a result, the Stagehand operations in Miami “were dissolved; assets were liquidated and personnel reassigned,” and “field offices that had received Stagehand services were made aware of potential compromise,” said the letter.

Meanwhile, as these efforts faltered, the CIA was looking toward its past to engineer its future. That meant that, by the early 2010s, the agency was once again ramping up its NOC programs — this time with a focus on recruiting and deploying spies in technical fields, such as predictive analytics or data brokerage, according to former officials. But the immense amount of data publicly available — with everything from retirement accounts to Social Security numbers being searchable online — increased the danger for undercover intelligence officers.

The NOC program, which was always expensive, was becoming even riskier, a concern that has prompted ongoing conversations within the agency about whether it’s worth the investment, according to two former officials.  

One former NOC who served in China as an undercover businessman in the mid-2010s approached Congress with specific concerns about the program, says a former national security official. The NOC was frustrated that his colleagues lacked experience in the field, didn’t speak local languages and were expected to recruit unrealistic targets, like top political figures or very senior businesspeople.

The NOC believed there were fundamental problems with the program, says the same former official, as the people working at headquarters assigned to design legends had “no idea how business and finance work.”

By mid-decade, the agency concluded that the best way to hide was in plain sight. Nowadays, say former officials, NOCs must truly “live their cover” — that is, actually work as the professional engineer or businessperson that they present themselves to be. NOCs live and work under their true names, say former officials, though they are known to their CIA counterparts by a pseudonym. Fewer than 10 percent of individuals within the CIA’s Directorate of Operations regularly use alias passports or credit cards, says a former senior official.

The intelligence community has developed sophisticated “backstopping” procedures, which seed a cover story through web traffic, emails and other digital channels. But in an interconnected world, “good backstopping can be defeated in a Google search,” says one former senior intelligence official. Because of that reality, the use of front companies for NOCs has become increasingly untenable, necessitating closer coordination and cooperation with private American businesses for the placement and recruitment of NOCs, say former senior officials.

It’s not always easy, however. “The CIA is very good at this, but they are getting the door slammed in their face,” says one former senior official. In Silicon Valley, recalls another former senior official, it was difficult to convince these companies to participate. The situation got worse in 2013, when Edward Snowden, an intelligence contractor, gave a trove of classified documents to journalists, exposing the extent of tech companies’ cooperation with the National Security Agency. “Before, it was hard,” says this person, and “it was harder to do post-Snowden.”

Even a switch of employer, or an unexplained gap in one’s résumé, can be a giveaway to a foreign intelligence service, say former officials. In response, the agency has also shifted to recruiting individuals within the companies they already work at, and, with the approval of corporate leadership, secretly transitioning those persons onto the CIA payroll, and training them intermittently and clandestinely, far from any known CIA facility. 

Sometimes, when these individuals are finished working for the agency, they simply transition back to a full-time job for the company where they already “work.” In one recent case, a NOC who had worked at a U.S. company as a “full-time career employee” and was transitioning out of his CIA work was “softly landed” back into another position at the same firm — with the agency paying for his moving expenses and a government severance package, says a former senior intelligence official.

The agency, which former officials say recruits and emplaces NOCs in the technology, finance and film industries, among other sectors, targets both major U.S. corporations and smaller U.S. companies, which are sometimes preferred because they are not beholden to shareholders.

Often, say former officials, only a few select executives within a company are aware of its relationship with the agency and the “real” identities of the people in their employ. To encourage or reward cooperation from businesses, agency officials will sometimes provide special, tailor-made briefings to executives on the political and economic climate of countries of business interest to that company, say two former officials.

“There is a serious legal and policy process” in place at the CIA to manage these relationships, says a former official. Otherwise, “you could break industries.”

By President Barack Obama’s second term, conversations and concerns about cover were ricocheting through executive offices at U.S. intelligence agencies. A special roundtable group was assembled at the CIA’s Directorate of Operations to work through the challenges wrought by the advancing digital age. And top FBI and CIA intelligence executives met together repeatedly to discuss how, and if, the practice of undercover human intelligence work could survive the 21st century. 

The digital threat to cover “was a major issue, even before I arrived at the agency,” says Avril Haines, who served as CIA deputy director from 2013 to 2015. “One way to frame our approach to the many challenges posed by technology was to ‘do less, but do it better,’ which meant focusing on what was most important and then spending the time and resources needed to keep it secret. We had conversations with other allied services who were experiencing similar challenges.”

In late 2015, then-CIA Director John Brennan also created a new Directorate for Digital Innovation to focus on threats in the digital world and “safeguard the cover of our clandestine officers,” as part of Brennan’s wide-ranging modernization effort for the agency. It was “over 10 years” overdue, says a former CIA official, who believed its impact was stymied by turmoil within the agency over the broader reorganization. 

By this time, massive amounts of digital records were being stolen — by insiders like Snowden and by adversaries like China, which also targeted private companies like Anthem, Marriott and others, in addition to spearheading two breaches into the OPM, which were revealed in 2015. The full extent of that theft, which included personal disclosure forms, clearance adjudication data and perhaps other linked intelligence community databases, has never been revealed. 

“Part of the discussions we had was, post-OPM hack, we didn’t realize that digitizing government records profoundly changed the threat profile,” says a former senior national security official. The intelligence community did not fully understand how much of its own information was stored outside its own walls until personal data began being stolen by China en masse, says a former senior intelligence official. 

Illustration: Shonagh Rae for Yahoo News

For the bureau, the single biggest takeaway from these high-level discussions, say two former senior officials, was the need to create programs where undercover employees would have no link to the FBI whatsoever. That meant no training at the FBI Academy in Quantico, Va.; no history of overt FBI work before being selected for undercover assignments; and no data trail of text messages or emails linking these personnel to the bureau in any form. It required a “monumental change in thinking,” says one of these former officials.

Generational issues have also frustrated officials. Recruitment to the CIA of younger people, particularly those born in the age of social media, has become more difficult, say former officials, with the agency lacking clearly defined policies for social media use. The CIA has adopted a position of “we’re not going to help you, but you better not do it wrong,” says one former agency official. Until a few years ago, agency officials were still counseling younger employees to quit social media, even though such behavior could be seen as suspicious, say former officials. The CIA still considers a Facebook friendship a “close and continuing relationship” for security purposes, say multiple former officials.

Bureaucratic slip-ups also remain a routine threat to cover. On at least one occasion, when the CIA sent a new alias package to an embassy overseas, the documents were placed on the desk of a foreign national employed there who was presumed to be working for the local hostile foreign intelligence service, says a former senior CIA official. CIA officers stationed in embassies were also provided with new cars and flat-screen TVs, unlike “real” diplomats, says the same person, a fact that frustrated diplomatic security officers.

But progress has been made on other fronts, say former officials, particularly in the creation of legends and alias documentation that can withstand digital scrutiny. The CIA’s alias documents are “the best in the world,” says a former senior official, because they’re real. For example, employees travel to the DMV to receive actual drivers’ licenses. At the CIA, a program called Checkpoint provides “tailored identity and travel intelligence products,” according to an agency document that WikiLeaks published in 2014. 

By midway through the Obama administration, the CIA and FBI were creating “extensive digital legends with increasing sophistication,” as one former senior official puts it, with cooperation from key government agencies like the Social Security Administration, Health and Human Services and the IRS.

U.S. intelligence agencies also work with “friendly digital companies,” like commercially available ancestry databases, to alter personally identifying information, say former officials, and also backdate work histories. Concerned about digital leakage, and cognizant of the need to strictly quarantine deep-cover intelligence officials from their organizations, U.S. officials have adopted a strategy of “eclipsing” these individuals slowly into their cover identities before they are allowed to undertake their missions.

The CIA and FBI both concluded that every person connected to these organizations’ “black side” undercover programs had to be completely sealed off from the rest of their colleagues, say former officials. This firewall is an immensely complex undertaking in a world where electronic emissions from a single cellphone traveling, say, from CIA headquarters in Virginia to an unmarked office building nearby could blow multiple undercover operations. The FBI has also struggled with this transition. As of a few years ago, “none of this was completed yet, and none of it was even remotely being done easily,” says a former senior official.

The CIA, at least, had its own past practices to draw from, especially in its training of NOCs, say former officials. Years ago, the school for NOCs was entirely quarantined from that for normal future CIA operations officers, who undertake rigorous instruction at “the Farm,” a Williamsburg, Va.-area base, say two former senior officials. NOCs “never came to the East Coast” and were trained at separate secret facilities, says one of these former officials. But because of their often “rebellious” attitudes in the field, and in order to “increase their behavioral consistency,” senior CIA officials decided to move their instruction to the Farm. This move produced better-trained NOCs but also increased the threat of exposure. As of recently, the programs were sealed off from each other again, says a former senior official. 

The pressures of the digital age have led the CIA to favor flexibility and deniability. The agency has formed a new reserve officer program to allow spies to work in the private sector, especially the tech industry, says a former intelligence official. The program is designed to allow those operatives to maintain their clearances so they can return seamlessly to the agency after a few years, says this person.

Another measure the CIA has used involves paying companies to gather intelligence for the government without even knowing it. In the last several years, the CIA has ramped up its use of “cutouts” to pay third parties to gather intelligence for them unwittingly, posing as data brokers looking into trends in the oil and gas industries, for example, says the same former official. 

The intelligence community needs to “think creatively about” intelligence collection, says Rep. Himes, who believes the traditional model of CIA officers who train in Virginia and then serve in an embassy overseas undercover will be difficult to continue. “This new panopticon that we’re beginning to live in” makes it “very hard to put people in physical proximity to each other,” says Himes. “That’s obviously dramatically true in some of the cities in China; it’s a little less true in La Paz, Bolivia. But nonetheless, there’s going to be a strong tidal pull away” from traditional human intelligence gathering, he says.

Yet he remains concerned about a tighter embrace between private industry and espionage. “We don’t, I think, want to be in a world where entire professions, whether it’s medical [workers] or journalists, are now at even more risk than they already are because people worry that they might be collecting intelligence,” says Himes.

If the old models of human intelligence gathering are compromised, the new alternatives may be inconsistent with democratic values, and it’s unclear what is — or whether there is — a good path forward. “Some people believe that within 10 years, espionage as we know it is going to be done,” says a former intelligence official.

Still, some within the CIA are sanguine about the future of the profession. “Anyone who says that human intelligence will become outdated is dead wrong,” says Marc Polymeropoulos, a recently retired CIA senior operations officer. “Intelligence services will always find ways to meet their agents.”

But even publicly, some intelligence officials are lamenting the dangers posed to cover, though they disagree over whether the problem can be addressed with new programs or procedures. Many are pessimistic that tweaking existing approaches will suffice.

“We can’t protect identities anymore. Tech is going to make it almost impossible. I think we need a new paradigm,” said Eric Haseltine, the former head of the NSA’s research directorate, at a lunch event in Washington in late October, when asked about the problem.

“Our officers overseas are known,” he said. “That’s a hard pill to swallow.”

Les 2 auteurs parlent de efforts (désespérés ?) de la CIA et du FBI depuis 15 ans pour tenter d'adapter le métier d'espion sous couverture à l'ère réseaux sociaux + biométrie (et des piratages des bases gouvernementales OPM + wikileaks).
Ou en d'autres termes, pour éviter de se faire "Bellingcat-iser" (sauf que la sanction chinoise / russe, ce n'est pas que de se faire expulser en PNG...)

Il y a de nombreux détails croustillants et inédits  (+ quelques infos sur les adaptations des SR russes et chinois au même défi)

  • Comme la grillade du programme FBI de gestion des identités de couverture (Stagehand).

 

  • En résumé, après des milliards de $ dépensés, ils ont constaté qu''ils ne pouvaient que limiter les dégâts :
    L'ère des alias multiples par pays semble terminée (cause biométrie : cf l'anecdote du suivi biométrique par le contre espionnage de Singapour ...) .
    La tendance semble être d'utiliser ... sa véritable identité.
    De nombreux responsables sont pessimistes sur le futur du métier.

    3 types de contre-mesure encore relativement efficaces:
    • sous-traitance : utiliser des "contractors" sans aucun lien avec les SR US.
    • "vivre sa couverture" : nouer des partenariats avec des entreprises privées, pour que l'agent ait une couverture parfaite ... car réelle.
    • demander la coopération des réseaux sociaux US, pour créer des couvertures antidatées (ou nettoyer l'identité d'origine)

      Mais cela nécessite des procédures spéciales pour former des agents complètements isolés de l'agence, qui ne soient pas grillables par des piratages / fuites / géolocalisation OSINT style Bellingcat.
      Bref, un département d'agent super black ...
       
  • Et comme je le soupçonnais, les bases de passeport biométriques européens auraient été visés ...
    A la fois par des pirates russes /chinois ... et par les américains, qui ont cherché pendant la coopération, à savoir comment fausser les contrôles biométriques (et à installer des backdoors pour insérer des identités de couverture).
    C'est de bonne guerre, j'aurais fait pareil à leur place. (et j'espère que nos SR ont fait de même ... c'est leur boulot)

------------------------------------------------------------------------

 

Rappel de mes posts précédents sur le même sujet:

Le 07/12/2017 à 11:47, rogue0 a dit :

Plusieurs réflexions sur l’impact des réseaux sociaux (et technologies de surveillance de masse) sur les agents des SR

1) Impact sur le « tradecraft » des agents de renseignement.

En particulier la difficulté de maintenir une couverture crédible quand tout le monde a un historique complet sur Facebook et autres réseaux sociaux. L’absence d’historique est dorénavant suspicieux.
https://www.thecipherbrief.com/hiding-in-plain-sight-maintaining-a-spys-cover-in-the-internet-era
(Tiens, l’article cite des équipes grillées par les caméras de surveillance : y a des contre-mesures déjà prévues? A part le piratage cf Vault7?)

  Révéler le texte masqué


AMHA, il y a des solutions simples : la nationalité américaine des réseaux sociaux est une carte à jouer pour les renseignements US :
insérer la couverture (avec historique rétroactif), soit par complicité des réseaux sociaux, soit par piratage de leurs bases de données.
(modifications difficiles à repérer, sauf à copier régulièrement les énorrrmes bases de réseau sociaux …)

Pour les autres pays, ça sera soit le piratage, soit peut-être simplement créer par avance une base de profils génériques, entretenue régulièrement par le service chargé des couvertures…
Les photos vont être un problème, à moins d’éviter les selfies, ou d’utiliser les vraies photos des agents (ça va faire des heureux ça …)

 

Le 05/03/2019 à 12:22, rogue0 a dit :

Complément : comment essayer de contrôler les réseaux sociaux, une source inépuisable pour l'OSINT.

J'ai failli le poster sur les fils cyberwarfare, Facepalm, ou Ukraine 2 / 3, mais c'est un problème universel.

 

Le 13/06/2019 à 19:51, rogue0 a dit :

Un gros article de synthèse sur les évolutions technologiques sur les services de renseignements:

https://foreignpolicy.com/2019/04/27/the-spycraft-revolution-espionage-technology/

EDIT : mon message a été mangé par le serveur (erreur "champ obligatoire", je le referait un jour si j'en ai le temps :/ )

 

  • J'aime (+1) 1
  • Merci (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

Note:

Ne pas faire attention au site de l'article (yahoo)

Les 2 auteurs sont des anciens de Foreign Policy, Politico, Carnegie / Aspen.
(et avaient déjà révélé des grosses bombes sur la compromission des réseaux d'espion de la CIA par les iraniens / chinois ...)

  • Merci (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

  • 2 weeks later...

Publication des mémoires d'une ex-agent de la CIA sous couverture (livre à paraître le 15 janvier en France, «Undercover, avoir vingt ans à la CIA» (Ed. JC Lattès))

Les mémoires de Amaryllis Fox ont été publié avec l'accord de la CIA, donc il n'y aura pas de grande révélation : plutôt son ressenti personnel.
Elle est rentrée à la CIA autour des attentats du 11 septembre, et a constaté en première ligne l'évolution de l'agence pendant 10 ans.

Vu le ton de son interview (en français), Trump ne risque pas de la citer en exemple
(comprendre ses "ennemis" pour les recruter au lieu de les torturer, les actions clandestines russes, etc)

http://www.leparisien.fr/international/espionne-de-la-cia-pendant-dix-ans-c-etait-un-mode-de-vie-tres-solitaire-10-01-2020-8233170.php

  • Upvote (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

  • 1 month later...

Je jette une pièce en l'air sur l'affaire Grivaux. :excl:

Bien entendu, il s'agit quelques soient nos opinions politiques, de rejeter la façon dont on "élimine" du débat publique une personne sur des éléments qui n'enffreignent pas la loi, mais qui destabilisent à dessein... C'est un danger pour le débat Publique. Epargnons-nous les videos embarrassantes...

Je n'ai aucune complaisance pour Jean-Marie Lepen, vous le savez mais j'ai quand même fait mienne une de ses rares bonnes phrases; "ici, on ne pratique pas la politique de la braguette!" [quand on lui demandait qui était homosexuel et si cela lui posait problème]

En somme la sphère privée reste privée et doit le rester, une conception bien française, plus complexe mais moins hypocrite:

Le monde/ Piotr Pavlenski, portrait d’un agitateur forcené converti au « kompromat 

https://www.lemonde.fr/politique/article/2020/02/14/piotr-pavlenski-portrait-d-un-agitateur-forcene-converti-au-kompromat_6029638_823448.html

Sortie de Macron: la Russie continuera à «essayer de déstabiliser

https://www.google.com/amp/s/amp.rfi.fr/fr/europe/20200215-conf%C3%A9rence-securit%C3%A9-acron-expose-craintes-face-russie

Bref, dans quel mesure il est facile de déstabiliser à coup de vidéos et comme le précisait une intervenante, ce soir, sur France info, d'une "pichenette" qui destabilise durablement un proche du président et le processus électorale français, même municipal.

Edit: Qui est ce Piotr? artiste militant qui a monté un site pour mettre en ligne ces éléments. Etait-il en mesure à lui seul de les obtenir ? Qui se cache derrière et pour quels intérêts?

En quoi est-il engagé ? ou compromis...

Modifié par Phacochère
Orthographe, syntaxe + forme
  • Upvote (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

Il y a 15 heures, Phacochère a dit :

Je jette une pièce en l'air sur l'affaire Grivaux. :excl:

Bien entendu, il s'agit quelques soient nos opinions politiques, de rejeter la façon dont on "élimine" du débat publique une personne sur des éléments qui n'enffreignent pas la loi, mais qui destabilisent à dessein... C'est un danger pour le débat Publique. Epargnons-nous les videos embarrassantes...

Je n'ai aucune complaisance pour Jean-Marie Lepen, vous le savez mais j'ai quand même fait mienne une de ses rares bonnes phrases; "ici, on ne pratique pas la politique de la braguette!" [quand on lui demandait qui était homosexuel et si cela lui posait problème]

En somme la sphère privée reste privée et doit le rester, une conception bien française, plus complexe mais moins hypocrite:

Le monde/ Piotr Pavlenski, portrait d’un agitateur forcené converti au « kompromat 

https://www.lemonde.fr/politique/article/2020/02/14/piotr-pavlenski-portrait-d-un-agitateur-forcene-converti-au-kompromat_6029638_823448.html

Sortie de Macron: la Russie continuera à «essayer de déstabiliser

https://www.google.com/amp/s/amp.rfi.fr/fr/europe/20200215-conf%C3%A9rence-securit%C3%A9-acron-expose-craintes-face-russie

Bref, dans quel mesure il est facile de déstabiliser à coup de vidéos et comme le précisait une intervenante, ce soir, sur France info, d'une "pichenette" qui destabilise durablement un proche du président et le processus électorale français, même municipal.

Edit: Qui est ce Piotr? artiste militant qui a monté un site pour mettre en ligne ces éléments. Etait-il en mesure à lui seul de les obtenir ? Qui se cache derrière et pour quels intérêts?

En quoi est-il engagé ? ou compromis...

yop

 

là, il y a 2 choses qui me dérangent :

- la premiere, qu'une personne à qui l'Etat a accordé sa protection en lui donnant un statut de refugié qui se permet de prendre partie dans une élection, dans le but de disqualifier le candidat du PR (et donc de viser le PR par ricochet) ; celui là est à renvoyer au goulag.

- la seconde, qu'un homme politique, encore plus de cette envergure, s'amuse à se pignoler, à se filmer et à adresser cela à on ne sait qui pour on ne sait quel motif... ça me laisse pantois, autant de connerie ! et dire qu'il se retire pour proteger sa famille et ses enfants ??? et il se fout de leur gueule, en plus : il se branle devant une femme inconnue et il veut preserver l'honneur des siens ? c'est un bouffon !

A l'heure où l'on peut se faire pirater, donc à notre insu, nos téléphones, il y en a encore qui pensent (ou plutot qui ne pensent pas) qu'ils ne sont pas concernés ? l'éthique, le sens de l'honneur, la probité ne doivent pas etre des mots connus.

le dégagisme !!!! il n'y a que comme ça (et avec des amendes salées pour les voleurs) que la sphere politique peut s'assainir.

 

Modifié par christophe 38
  • Upvote (+1) 2
Lien vers le commentaire
Partager sur d’autres sites

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Restaurer la mise en forme

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

 Share

  • Statistiques des forums

    21,5k
    Total des sujets
    1,7m
    Total des messages
  • Statistiques des blogs

    4
    Total des blogs
    3
    Total des billets
×
×
  • Créer...