Royal Moroccan Armed Forces


 
AccueilS'enregistrerConnexion

Partagez | 
 

 Renseignement & Espionnage

Voir le sujet précédent Voir le sujet suivant Aller en bas 
Aller à la page : 1, 2, 3, 4, 5, 6, 7  Suivant
AuteurMessage
Samyadams
Administrateur
Administrateur


messages : 7057
Inscrit le : 14/08/2008
Localisation : Rabat Maroc
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Renseignement & Espionnage   Mar 3 Mai 2011 - 13:39

Le renseignement étant une activité d'une importance stratégique cruciale, un topic lui est désormais dédié;

Citation :
Un Néerlandais accusé d’espionnage pour le compte de la Biélorussie

Les services spéciaux néerlandais ont interpellé un pilote des forces aériennes nationales soupçonné d'espionnage pour le compte de la Biélorussie, rapporte vendredi la radio hollandaise Radio Netherlands Worldwide.
Agé de 37 ans, le pilote de chasseur F-16 est accusé d'avoir transmis des secrets d'Etat aux services de renseignement biélorusses.
Selon le quotidien néerlandais De Telegraaf, le détenu avait l'intention de mener des affaires avec un ressortissant biélorusse. Le porte-parole du parquet hollandais a refusé de commenter ces informations "pour ne pas nuire aux intérêts de l'enquête" et "en raison du caractère délicat de la question du point de vue diplomatique".
MOSCOU, 29 avril - RIA Novosti
http://fr.rian.ru/world/20110429/189317111.html

_________________
Revenir en haut Aller en bas
vympel27
Commandant
Commandant


messages : 1101
Inscrit le : 31/03/2008
Localisation : maroc
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Jeu 5 Mai 2011 - 5:14

la biélorussie qui espionne les pays-bas franchement je vois pas l'interet pour ce pays.je crois plutot que les services biélorusses font le travail pour le compte des russes.d'ailleurs c'est une pratique courante de ces derniers faire traiter un agent par l'intermediaire d'un pays tiers.du temps de la guerre il y avait une division du travail entre le KGB et les autres services des pays du pacte de varsovie.a noter que les services biélorusses gardent toujours la meme denomination kgb.
Revenir en haut Aller en bas
flux
2eme classe
2eme classe


messages : 1
Inscrit le : 23/02/2012
Localisation : fes
Nationalité : Maroc

MessageSujet: Re: Renseignement & Espionnage   Mar 28 Fév 2012 - 1:46

les russes dans le temps sont connus pas leur forces en ce qui concerne l'espionnage vous pouvez trouver des officiers dans tous les armées étrangères (qui sont classés mondialement et qui contribue un danger sur eux) ils sont déguisés et vous pouvez les trouver dans chaque armée avec une nationalité de ce dernier mais toujours il fait grâce à son origine (russe) car les russes ont pour objet d'après l histoire et d après des messages qui les fait introduire dans leurs films (médias) ils veulent dominer le monde vis-à-vis qu'ils sont fort dans la marine ce sont ceux les leaders de l armée navale depuis la guerre froide avec l USA le corps des informations du russe reste un corps qui a connu une riche instruction.
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Mar 28 Fév 2012 - 19:29

BBC:
Citation :
Alarm over UK-French drone document theft in Paris


The two leaders agreed last week to push ahead with the next phase of "fighter drone" aircraft


PM and Sarkozy agree closer links
A briefcase filled with documents relating to a new Franco-British drone project has been stolen at the Gare du Nord station in Paris, reports say.

Police have been examining closed circuit film to discover who took the papers, reportedly on 2 February.

UK PM David Cameron discussed a plan for pilotless drones with President Nicolas Sarkozy last week.

French developer Dassault Aviation says no sensitive documents were taken and the project's security is not at risk.

The BBC's Christian Fraser in Paris says the bilateral development plan is the biggest since the two countries recently agreed to share defence assets.

According to a report in Le Parisien newspaper, the briefcase was stolen when a senior Dassault Aviation official buying a Eurostar rail ticket went to the help of a colleague who was being bothered by a young man. When the official returned to retrieve his case, it had disappeared.

It is thought his attention was deliberately diverted while an accomplice made off with the case.

A Dassault spokesman denied initial French reports that important documents were taken, suggesting it was a straightforward criminal act.

"The police shouldn't have difficulty finding the thieves because the area was filmed," he told French media.

The company has said it is confident that the theft will not bring into question the secrecy of the project and is hopeful the documents can be recovered.

At a meeting in Paris on 17 February, Mr Cameron and the French leader agreed to work more closely on military operations and civil nuclear power, pushing ahead with plans for the next phase of a planned new generation of unmanned "fighter drone" aircraft.


Au Canada, Mi Janvier

CBC / Canadian Press


Jeffrey Delisle: The naval officer accused of revealing state secrets
http://www.cbc.ca/news/canada/story/2012/01/20/f-jeffrey-paul-delisle.html

Citation :
Canadian naval intelligence officer Sub-Lt. Jeffrey Delisle is at the centre of what's being called Canada's biggest spy scandal in more than half a century.

The RCMP arrested Delisle on the weekend of Jan. 14 and charged him with violating the Security of Information Act. The charges against him include breach of trust and communicating information to a foreign entity without lawful authority that the government of Canada or a province has taken measures to safeguard. None of the charges against him have been proven.

Details about his life and the allegations are still sketchy, but he is known to be divorced and has custody of three of his four children. One source is an old MySpace page that Delisle seems to have neglected for a few years. He listed his interests as computers, reading, firearms, gardening, Monday Night Football, fishing, camping and canoeing.

March 30, 1971
Jeffrey Paul Delisle born.

June 1990
Delisle graduates from Sackville High School in Lower Sackville, N.S. "Jeff was a sort of person who just blended into the background," high school chum Greg Auton told The Globe and Mail.

January 1996
Delisle joins the reserves as an intelligence operator, serving with 3 Intelligence Company in Halifax. The company conducts intelligence gathering.

May 3, 1997
Delisle marries Jennifer Lee Janes in Lower Sackville, N.S.

Feb. 17, 1998
Delisle files for bankruptcy. Records show he declared liabilities of $18,587 and assets of $1,000. His listed address was on Beaver Bank Road, near his old high school.

March 2001
Delisle enrols as a regular member of the Canadian Forces. According to former neighbours, around this time, the Delisles move into a co-op in Lower Sackville for low-to-moderate-income households.

October 2001
Delisle completes a junior leadership course, obtains the rank of corporal.

2004
At some point in this year, the Delisles' two young daughters are hit by a vehicle a block away from their home. One of them ends up in hospital, and for years, Delisle would pursue the offending driver for money.

November 2006
Delisle is promoted to sergeant.

2006
Delisle begins working at the chief of defence intelligence office in Ottawa. The family takes up residence near the suburb of Orleans, Ont.

2007
Delisle starts a stint at the strategic joint staff division in Ottawa.

A former neighbour of the Delisles later recalls a day in 2007 when she saw Delisle hiding behind a hedge to see what his wife was doing at the home of another man in the neighbourhood.

July 6, 2007
According to the RCMP, Delisle first breaches a trust or communicates safeguarded information. The Mounties have yet to elaborate on the details of this breach.

2008
Delisle enrols in the faculty of arts at Royal Military College in Kingston, majoring in politics. This is part of a university training plan for non-commissioned members of the Canadian Forces.

June 2008
Delisle and his wife sign a separation agreement, which stipulates that Delisle assumes the couple’s debts on three credit cards and a consolidated loan. The Delisles' eldest daughter, Angelica, stays in Gloucester, Ont. with her mother, while Delisle takes custody of the remaining children – daughter Victoria and sons Noah and Jonah – and moves with them to Kingston, Ont.

July 2008
Delisle receives a commission, becomes a naval officer.

May 3, 2010
The Delisles file for divorce. According to the National Post, a number of residents in the Delisles' condo complex said it was an affair that brought their marriage to an end.

September 2010
After graduating with a BA from RMC, Delisle joins the Land Forces Atlantic Area Headquarters in Halifax. Delisle's youngest daughter and two sons accompany him to Nova Scotia.

August 2011
Delisle joins HMCS Trinity, an intelligence facility at the naval dockyard in Halifax that tracks vessels entering and exiting Canadian waters via satellites, drones and underwater devices. The centre is a multinational base with access to secret data from NATO countries.

Jan. 13, 2012
According to the RCMP, this is the date that Delisle last breached a trust or communicated safeguarded information.

Jan. 14-15, 2012
Delisle is arrested by the RCMP. He is charged with breach of trust and communicating safeguarded information to a foreign entity without lawful authority. Delisle is the first person charged under Section 16(1) of the Security of Information Act.

Delisle is led out of a Halifax court on Jan. 16. (Andrew Vaughan/Canadian Press)
Delisle's neighbours in the Halifax suburb of Bedford told the Halifax Chronicle Herald that after his arrest, the woman and three children he was living with moved out of the family home.

"On Wednesday [Jan. 18], no cars were in the driveway, and blinds covered the windows," reported the Herald's Selena Ross. "Three bed frames and mattresses, including two single-sized children's beds, leaned against the side of the house."

Jan. 17, 2012
Delisle's lawyer, Cameron Keen, attends Delisle's bail hearing in Halifax and requests a delay in order to have more time to prepare, but Delisle does not appear. A hearing is set for Jan. 25. He is being held at the Central Nova Scotia Correctional Facility in Dartmouth, N.S.

At an Ottawa news conference, Defence Minister Peter MacKay says the case is a matter of national security because of the charges involved.

Jan. 23, 2012
The military evacuates HMCS Trinity in order to search the naval communications and surveillance centre for evidence of espionage or devices meant to leak information to the outside.

In a separate development, Delisle’s lawyer, Cameron MacKeen, quits the case. He does not explain why, or whether his ties to the Conservative Party and Peter MacKay influenced his decision. Delisle's next appearance is rescheduled from Jan. 25 to Feb. 28.

Feb. 28, 2012
Delisle is due back in court in Halifax for a bail hearing. He faces two charges of violating a section of the Security of Information Act and one charge of breach of trust under the Criminal Code. The Criminal Code charge can net a five-year prison sentence, and convictions under the Security of Information Act can lead to life in prison.

Citation :
Spying mystery deepens with lack of information
Russian departures connected to allegations against naval officer Jeffrey Paul Delisle


Citation :
Two Russian Embassy staff in Ottawa have left Canada in the wake of spying allegations against a Canadian naval officer in Halifax, but there's little else that's clear about the murky espionage case.

Intelligence experts and those in close contact with the embassy disagree on whether any Russian diplomats engage in spying, leaving Canadians to try to piece together what bits are public.

Initial media reports said up to four Russian Embassy staff had been removed from a list of embassy and diplomatic staff recognized by Canada. CBC News has confirmed that two have had their credentials revoked since news broke of the naval officer's arrest, while two diplomats left the country a month or more before the arrest this week of Canadian Sub.-Lt. Jeffrey Paul Delisle.

Another report pointed to two other staff who are no longer accredited to be in Canada. It's not clear which of the staff have been expelled over the spying allegations.

Konstantin Kolpakov, a former aide to the ambassador, was scheduled to leave Canada on Dec. 25 because his posting was over, and had a send-off attended by diplomats in Ottawa mid-month.

TIMELINESpies and Canada's secrets
CBC News has also learned Lt.-Col. Dmitry V. Fedorchatenko, assistant defence attaché, was scheduled to leave in November.

Kolpakov and Fedorchatenko were known to circulate around the diplomatic scene in the capital, attending functions with other foreign representatives, Canadian diplomats and journalists.

Two others, Mikhail Nikiforov and Tatiana Steklova, were listed as administrative and technical staff until Jan. 19 but are no longer on a list of accredited diplomats on the website of the Department of Foreign Affairs.

Russia, Canada not commenting
A report in the Russian media Friday quoted the country's foreign ministry as saying it was surprised to see Canadian media reports about the expulsions. The report says the embassy staff left at the end of 2011 because their rotations were ending.

A woman who answered the phone at the Russian Embassy in Ottawa refused to comment on the departures.

Public Safety Minister Vic Toews refused to comment on a national security matter, but did say: "I'm not aware of why those individuals left Canada."

Lt.-Col. Kay Kuhlen, defence attaché for the German Embassy and head of the Ottawa Service Attachés Association, an organization that helps military diplomats, said he was advised in September that Fedorchatenko was leaving. His farewell event was Nov. 10. He also said he is "surprised" by the reports of spying.

Russian diplomatic staff usually do two- or three-year postings at the embassy before returning home or going on to a posting in another country.

P.O.V.
Do spying charges damage Canada reputation? Take our survey.

Delisle, 40, was arrested in the Halifax area last weekend. He faces two charges under the Security of Information Act that deal with communicating information that could harm Canada's interests, according to court documents.

Canadian naval officer and Halifax native Jeffrey Paul Delisle, seen in this 1990 high school yearbook photo, is accused of passing defence secrets to the Russians.
'Everybody' in embassies collects information
Doug Thomas, a former defence official who now represents a Russian military equipment exporter in Canada, said the vast majority of diplomats collect information, while a small number may pick it up "through alternative means." Thomas doesn't believe anyone at the Russian Embassy, with whom he's worked since 2006, is involved in spying.

"If you were going to run one of these operations, the last thing, personally, I’d think you’d want to do is run it out of the Russian Embassy on Charlotte Street in downtown Ottawa. You’d want to run it remotely," he said.

But the Russians "are among the world’s biggest spies," said Wesley Wark, an expert on security and intelligence at the University of Ottawa. "Spying is just in the DNA of the Russian state."

Wark said the Russians are known to be aggressive, flooding their diplomatic missions with intelligence personnel posing as diplomatic personnel. He said the country, if it uses spying effectively, could close research and development gaps. They may also want access to Canadian communications with the U.S. and the U.K. or other allies.

"We [Canadians] tend to underrate ourselves as an intelligence target. We’ve long been an intelligence target, partly because of who we are. We’re a NATO country, we’re a Western country, we’re a high-tech country, we engage in a lot of military operations and we’re close to the United States and close allies," Wark said.

Geoffrey O'Brian, a former director general of counter-intelligence at the Canadian Security Intelligence Service, said there's so little information available that it's hard to assess the situation.

"Because the government has chosen not to talk about this, it's frankly in some ways a recipe for speculation," O'Brian said.

Many questions remain, particularly from a counter-espionage angle, O'Brian said.

"Are there more [people gathering information]? How was he recruited, if indeed he was? How was it run? Who else was involved in quote-unquote handling him? All of those questions."

Charges relate to security information act
Two of the charges against Delisle are for breach of trust and communicating to a foreign entity information the government wants to safeguard, and cover July 7, 2007, to Jan. 13, 2012. A third charge is for trying to communicate to a foreign entity information the government wants to safeguard, and covers Jan. 10 to 13, 2012, after at least one of the Russian diplomats left Canada.

Defence Minister Peter MacKay described the case Tuesday as a matter of national security because of the charges involved, but would not discuss specifics at that time, including whether the foreign entity in question was Russia.

"Given the early stages of the proceedings, there is really nothing more that can be said," he told a news conference in Ottawa.

The minister sought to reassure Canadians that allegations of espionage revolving around the Halifax naval intelligence officer would not affect the country's reputation among other NATO members.

"Our allies have full confidence in Canada, full confidence in our information," MacKay said.

_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Mar 28 Fév 2012 - 19:36

Dans la categorie non-news ETC ETC ETC:

NYPD Spied On Muslim Students At Yale, All Over The Northeast

http://www.huffingtonpost.com/2012/02/21/nypd-spied-on-muslim-stud_n_1290544.html

NYPD Built Secret Files On NJ, Long Island Mosques

http://www.huffingtonpost.com/2012/02/22/nypd-built-secret-files-o_0_n_1293242.html

NYPD: Newark, New Jersey Police Knew About Surveillance Of Muslim Communities

http://www.huffingtonpost.com/2012/02/24/nypd-newark-new-jersey-police-knew-about-surveillance-of-muslim-communities_n_1298891.html

Huffington Post

ETC ETC ETC...

_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Jeu 1 Mar 2012 - 18:16

Drones Set Sights on U.S. Skies

The New York Times

http://www.nytimes.com/2012/02/18/technology/drones-with-an-eye-on-the-public-cleared-to-fly.html?_r=1

Citation :


...

Under the new law, within 90 days, the F.A.A. must allow police and first responders to fly drones under 4.4 pounds, as long as they keep them under an altitude of 400 feet and meet other requirements. The agency must also allow for “the safe integration” of all kinds of drones into American airspace, including those for commercial uses, by Sept. 30, 2015. And it must come up with a plan for certifying operators and handling airspace safety issues, among other rules.

The new law, part of a broader financing bill for the F.A.A., came after intense lobbying by drone makers and potential customers.

The agency probably will not be making privacy rules for drones. Although federal law until now had prohibited drones except for recreational use or for some waiver-specific law enforcement purposes, the agency has issued only warnings, never penalties, for unauthorized uses, a spokeswoman said. The agency was reviewing the law’s language, the spokeswoman said.

For drone makers, the change in the law comes at a particularly good time. With the winding-down of the war in Afghanistan, where drones have been used to gather intelligence and fire missiles, these manufacturers have been awaiting lucrative new opportunities at home. The market for drones is valued at $5.9 billion and is expected to double in the next decade, according to industry figures. Drones can cost millions of dollars for the most sophisticated varieties to as little as $300 for one that can be piloted from an iPhone.

“We see a huge potential market,” said Ben Gielow of the Association for Unmanned Vehicle Systems International, a drone maker trade group.

...


En parlant de drones en version p'tits fours:





I love you

_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: CSIS OK'd to share data despite torture risk Public Safety Minister Vic Toews outlined instructions    Ven 2 Mar 2012 - 22:01


CSIS OK'd to share data despite torture risk
Public Safety Minister Vic Toews outlined instructions for Canada's spy service, document shows


Canadian Press / CBC

Citation :


The federal government has given Canada's spy service the go-ahead to provide information to foreign agencies even when there is a "substantial risk" it will lead to torture, a newly released document shows.

Public Safety Minister Vic Toews outlines instructions for sharing information in such cases in a four-page directive to Canadian Security Intelligence Service director Dick Fadden.

A copy of the July 2011 directive — secret until now — was released to The Canadian Press under the Access to Information Act.


The directive is squarely at odds with Canada's international commitments against torture — which have no loopholes, said Alex Neve, secretary general of Amnesty International Canada.

"There's no ifs, ands or buts to that — there's no qualifications," he said. "This is one of the clearest areas of international law."

Interim Liberal Leader Bob Rae said the federal policy is "unprecedented in our history."

"It, I think, reflects a complete breach of our international obligations with respect to torture," he said at a Friday news conference. "And I think it shows a government which has simply lost its way in terms of Canadian values.

"This is not how we do business in Canada."

CSIS can use torture-tainted info if public safety at risk
The directive comes to light just weeks after disclosure of an earlier ministerial order telling CSIS to use information that may have been extracted through torture in cases where public safety is at stake.

Its release touched off a heated public debate about whether Canada was tacitly encouraging brutal tactics by foreign jailers.

The latest directive essentially incorporates that December 2010 order and provides newly crafted guidance on information sharing — including the provision of material to foreign government agencies, militaries and international organizations.

It says Canada "does not condone the use of torture" and is party to international agreements that prohibit torture and other forms of cruel, inhuman, or degrading treatment or punishment.

It adds that "terrorism is the top national security priority" of the government and it is essential that CSIS maintain strong relationships with foreign entities and share information with them on both a routine and urgent basis.

The directive says that in most cases CSIS is responsible for establishing internal approval rules "proportionate to the risks" in sharing information with foreign agencies.

It also lays out procedures for information sharing when the risk of torture is "substantial" — meaning a "personal, present and foreseeable risk" based on something more than "mere theory or speculation."

The decision must be referred to the CSIS director when there is a substantial risk that sending information to, or soliciting information from, a foreign agency would cause harm to someone, and it is unclear whether the risk can be managed by seeking assurances that the material won't be misused.

In deciding what to do, the CSIS chief will consider points including:

the importance to Canada's security of sharing the information;
the status of Canada's relationship with — and the human rights record of — the foreign agency;
the rationale for believing that sharing the information would lead to torture;
the proposed measures to lessen the risk, and the likelihood they will be successful — for instance, the agency's track record;
the views of Foreign Affairs and other agencies.
'Wholly and entirely inconsistent': Amnesty International Canada
The directive says the CSIS director can refer the decision to the Public Safety minister, who may give the green light to share the information only after considering the directive and Canada's legal obligations.

Neve said the directive "clearly leaves open the very real possibility that the decision taken will be, 'Do it,' even though there's a substantial risk."

"That's just wholly and entirely inconsistent with the assertion that these decisions are going to be in accordance with our legal obligations."

The Public Safety Department said the government strongly opposes the mistreatment of any individual by any foreign agency for any purpose.

"At the same time, we must ensure that public is protected from those who would do harm," the department said in an emailed response.

"The 2011 Ministerial Direction provides comprehensive guidance to CSIS on sharing information in order to safeguard national security while at all times promoting and upholding the values Canada seeks to protect."

A federal inquiry by Justice Dennis O'Connor into the Maher Arar torture affair recommended in 2006 that federal policies include specific directions "aimed at eliminating any possible Canadian complicity in torture."

Arar, a Syrian-born Canadian, was detained in New York in September 2002 and deported soon after by U.S. authorities — winding up in a Damascus prison. Under torture, he gave false confessions to Syrian military intelligence officers about involvement with al-Qaeda.

O'Connor concluded that inaccurate information the RCMP passed to the United States very likely led to the Ottawa engineer's year-long nightmare.

A subsequent inquiry headed by former Supreme Court judge Frank Iacobucci into the imprisonment of three other Arab-Canadian men during the same period after the Sept. 11 attacks found Canadian officials had a hand in the torture of Abdullah Almalki, Ahmad El Maati and Muayyed Nureddin in Syria through the sharing of information with foreign intelligence and police agencies.

In the case of Almalki, Canadian officials provided questions to Syrian military intelligence.



_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Mar 3 Avr 2012 - 19:04

L'espionne russe avait failli avoir un membre du cabinet Obama

Citation :
Anna Chapman, Russian Spy, Allegedly 'Got Close' To Obama's Inner Circle

Was one of Obama's inner-circle officials on the brink of being seduced by a sexy Russian spy?

In a recent interview with the BBC, one of the FBI's top brass suggested that redheaded beauty Anna Chapman—a Russian agent sent home in 2010 as part of the biggest spy swap since the Cold War—was "close enough [to the administration's inner-circle] to disturb" the FBI, according to head of counterintelligence Frank Figliuzzi.

According to Figliuzzi, the spy ring was "getting close enough to a sitting US cabinet member that we thought we could no longer allow this to continue," although he would not identify the official in question. Chapman, who allegedly worked undercover in Manhattan real estate, was arrested on June 27, 2010.

Chapman's return to Russia didn't thwart her star power. In October 2010 she became the face of a Moscow bank and in January 2011 she appeared in Playboy.

Just last month, she trotted down the runway in what resembled an all-black spy suit for the second year in a row at Russian Fashion Week .

Huffington Post

http://www.huffingtonpost.com/2012/04/03/anna-chapman-obama_n_1398430.html


Pls serieusement, Curveball, l'informateur irakien sur les WMD, reconnait qu'il a falsifie les histoire de guerre bio Rolling Eyes
Les news rapportees a ce type font croire qu'il a falsifie, Menanmoin, un article du NYT aprle de pressions de l'administration Bush jr sur la CIA pour produire des "resultats" recherches.


The Guardian:
Citation :
Defector admits to WMD lies that triggered Iraq war

• Man codenamed Curveball 'invented' tales of bioweapons
• Iraqi told lies to try to bring down Saddam Hussein regime
• Fabrications used by US as justification for invasion

The defector who convinced the White House that Iraq had a secret biological weapons programme has admitted for the first time that he lied about his story, then watched in shock as it was used to justify the war.

...

Le rest ici SVP http://www.guardian.co.uk/world/2011/feb/15/defector-admits-wmd-lies-iraq-war

http://www.guardian.co.uk/world/2011/feb/15/curveball-iraqi-fantasist-cia-saddam


Voici l'arcticle du NYT:

Ghosts of Iraq Haunting C.I.A. in Tackling Iran

Citation :
...
The intelligence community also now requires that analysts be told much more about the sources of the information they receive from the United States’ human and technological spies. Analysts were left in the dark on such basic issues in the past, which helps explain why bogus information from fabricators was included in some prewar intelligence reports on Iraq. And, when they write their reports, they must include better attribution and sourcing for each major assertion.

“I think the Iraq experience gave them thicker skins,” said one former senior intelligence official, who like several others quoted in this article would speak only on the condition of anonymity about internal agency matters. “There was a lot of work done to tighten up the tradecraft.”

Unlike the prelude to the Iraq war, when many critics accused Bush White House officials of cherry-picking the intelligence to conform to their policy, some outside analysts say they do not see evidence of the Obama administration pushing intelligence officials to come up with predetermined answers.
...

http://www.nytimes.com/2012/04/01/world/middleeast/assessing-iran-but-thinking-about-iraq.html?pagewanted=all

_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Dim 8 Avr 2012 - 20:21

En repose a ce post:

http://far-maroc.forumpro.fr/t3264p930-actualites-au-moyen-orient#227853

Un retour au passe:

L'operation TPAJAX alias Operation Boot chex les britaniques a profondement marque le regime iranien.

Tout d'abord je suis certain que DEBKAfiles se trompe sur la nature monolithique "one man show". Il s'agit certes d'une depiction negative (d'un regime totalitaire) mais impossible amintenir dans un pays qui etait deja nebuleux dans les annees 50.

Tout le fiasco de renversement de Mossadegh pour l'Anglo-Iranian Oil Company alias le British Petrolium d'aujourdhui, lorsque ses dirigeants declaraint que "tout ce qui se trouve sous le sol iranien est la propriete des britanniques" a produit des ondes de choc dont le resultat est un regime qui se definit par anti-americain par essence meme et souvrainiste par default ou par desepoir de cause.

Un dossier du NYT:





http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html


Un excellent livre qui raconte l'operation de renversement du Mossadegh qui a prdouit la tyrannie du Shah avant de finir en revolution islamiste



Par Stephen Kinzer http://www.stephenkinzer.com/


_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Dim 1 Juil 2012 - 10:54

La mort "etrange" d'un expert en cryptage du GCHQ/MI6, "suicidee" dans une sacoche...

Citation :
MI6 Codebreaker Attended U.S. Security Conference Before His Death

http://www.wired.com/threatlevel/2012/05/mi6-codebreaker-at-blackhat/

A top British codebreaker who died a mysterious death in his flat two years ago had just returned from a computer security conference in the United States before his death, according to information disclosed during an inquest this week.
The body of Gareth Williams, a codebreaker with Britain’s MI6 spy agency, was discovered stuffed into a sports bag in his bathtub on Aug. 23, 2010, though he’s believed to have been killed Aug. 15.

Williams had just returned to London on Aug. 11 after spending six weeks in the United States, where he attended the annual Black Hat security conference in Las Vegas as part of a contingent of British spies, according to witnesses who spoke at the inquest. He attended Black Hat in 2008 as well.

It’s believed Williams may have also attended Black Hat’s companion hacker conference, DefCon, which follows Black Hat and draws many of the same attendees. In 2010, Black Hat was held July 24 to 29, while DefCon ran from July 30 to Aug. 1.

Black Hat is one of the top security conferences in the world, targeting the professional security crowd, while DefCon is geared more specifically to hackers. Law enforcement agents, the military and undercover spies regularly attend both conferences — often undercover — to keep pace with the latest research and learn what hackers are up to. They also recruit hackers for professional work.

DefCon holds an annual spot-the-fed contest to out undercover agents as a good-natured sport. Attendees who spot a fed receive an “I spotted a Fed” T-shirt, while the outed agent gets a trophy T-shirt of his own to take back to his office, sporting the phrase “I was spotted at DefCon.”

Not everyone wants to be outed or plays by the conference ground rules for working undercover. Several years ago, undercover agents believed to be working for Israel’s Mossad spy agency were kicked out of the conference after registering as journalists and posing as a French film crew from Canal Plus.

It’s not known specifically why Williams attended Black Hat or if he and his colleagues attended incognito. A Black Hat organizer did not immediately respond to a request for comment.

Williams, who was 31 when he died, was found inside a North Face nylon sports bag in the bathtub of his apartment. His nude body was in the fetal position, with his arms folded across his chest. The bag was closed with a padlock, and two keys to the padlock were found underneath Williams’ body inside the bag.


MI6 coder Gareth Williams attended the Black Hat security conference in the U.S. with fellow spies days before his mysterious death. Photo: Courtesy of the Metropolitan Police
His mobile phone and a number of SIM cards were laid out on a table nearby; the phone had been restored to its factory settings. There were no signs of forced entry to the apartment and no signs of a struggle.

Williams was described by those who knew him as a “math genius” who graduated from Bangor University at the age of 17 with a degree in mathematics. He’d begun his university studies while still in secondary school. In 2001 he joined Government Communications Headquarters (GCHQ), Britain’s listening post, helping to break coded Taliban communications, among other things. He was considered a “world-class intelligence officer” and had won two awards for codebreaking, according to his boss at GCHQ.

In 2009, he was loaned out to MI6, Britain’s foreign intelligence service, for a three-year stint, but asked to be transferred back to GCHQ after a year. He was preparing to move back to his old job around the time he was killed.

Williams had worked in a four-man team as an expert codebreaker and shortly before his death had been in contact with two secret agents working in the field in the U.K., according to testimony at the inquest.

The Daily Mail quoted anonymous sources last year saying that Williams had been working on secret technology to track stolen money being laundered through Britain by Russian mafia. The technology was reportedly designed to allow MI6 agents to follow money from bank accounts in Russia to criminal gangs in Europe via internet and wire transfers.

He also worked on another secretive project to develop devices for stealing data from mobile phones and laptops using wireless technology.

“He was involved in a very sensitive project with the highest security clearance,” the anonymous source told the Daily Mail. “He was not an agent doing surveillance, but was very much part of the team, working on the technology side, devising stuff like software.”

The source indicated that Williams’ work to disrupt the Russian mafia could have put him at risk.

“Some of these powerful criminal networks have links with, and employ, former KGB agents who can track down people like Williams,” the source said.

Williams also had reportedly worked with the NSA and British intelligence to intercept e-mail messages that helped convict would-be bombers in the United Kingdom. He had made repeated visits to the United States to meet with the National Security Agency and worked closely with British and U.S. spy agencies to intercept and examine communications that passed between an al-Qaida official in Pakistan and three men who were convicted in 2009 of plotting to bomb transcontinental flights.

Investigators said during the inquest that there was no evidence Williams was killed as a result of the work he was doing, but they acknowledged that a full investigation had been thwarted by the spy agencies who employed Williams, raising suspicions that the agencies might have been involved in his death or at least know who was responsible for it.

Hours before he died, surveillance cameras captured Williams in London’s Knightsbridge neighborhood while he was shopping at the luxury department store Harrods. Williams was expected at work the next day, but never showed up. MI6 did not report him missing, however, until Aug. 23, at which point his body had decomposed, thwarting attempts to determine the precise cause of death.

The spy agencies also failed to hand over nine thumb drives found in Williams’ locker at work. The drives were released to investigators only this week. Other electronic equipment that Williams used at work was handed over to Scotland Yard investigators four days after Williams’ body was discovered, raising questions about whether they had been cleaned by the spy agencies first.

Family and friends testified that Williams was unhappy with his work environment at MI6 and felt he didn’t fit in with his colleagues. During the inquest, testimony revealed that the coder had conducted unauthorized searches of an MI6 database that could have put him at risk if he was discovered. Investigators said, however, that MI6 was apparently unaware that Williams had conducted the searches.

A coroner said at the inquest that while it appeared unlikely that British spy agencies played a role in the coder’s death, it was still a “legitimate line of inquiry” for the investigation.

Investigators found no fingerprints or any other evidence indicating someone had been with Williams the night he died, or that anyone beyond his family had ever been in his apartment. Investigators said at the inquest that small traces of incomplete DNA had been found on the tiny padlock that had been used to close the bag in which Williams’ body was stuffed. The only other DNA evidence found in the apartment that didn’t belong to Williams or his family was found on a green hand towel in the kitchen.

Authorities plan to take DNA evidence from 50 colleagues who worked with Williams at MI6 to determine if there is a match.


Citation :
MI6 death: Gareth Williams's family in 'dark arts' fear
http://www.bbc.co.uk/news/uk-england-london-17562112

Citation :
Profile: MI6 spy Gareth Williams

http://www.bbc.co.uk/news/uk-17790563

Citation :
Gareth Williams: Met orders forensic review

Commissioner Bernard Hogan-Howe says new evidence will be examined and warns MI6 officers to co-operate with police

http://www.guardian.co.uk/uk/2012/may/08/gareth-williams-met-orders-forensic-review




Tentative de reconstruction sur comment qq de "suicide" peut fermer la sacoche derriere lui

_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
tshaashh
Lt-colonel
Lt-colonel


messages : 1305
Inscrit le : 13/12/2010
Localisation : Canada
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Dim 1 Juil 2012 - 11:40

Liens du livre "All the Shah's men" sur Scribd

http://www. scribd. com/doc/91236558/AlltheShahsMen

Une livre parmi d'autre pleins d'enseignements.


Quelques passages que j'ai trouve representatifs


p. 810
Citation :

Roosevelt expected this advice. “I had been sure from the beginning that a personal meeting would be necessary, ”he wrote afterward. “Securely and alone, the Shah and I could resolve the many difficult problems confronting us. This could only be done on a persontoperson basis. In all likelihood we would have to meet notonce but several times. So the sooner we got to it, the better. ”Toprepare the way for his visit, Roosevelt sent his trusted agentAssadollah Rashidian to see the Shah on August 2. Rashidian’s message was simple:the British and the Americans were planning acoup and would not be deterred. Under these circumstances

Rashidian observed tartly, the Shah had little choice but to cooperate. The Shah nodded in silent agreement.


Only Roosevelt, however, could close the deal. He asked an agentin the royal court who was known by the code name Rosenkrantz toapproach the Shah and say that “an American authorized to speakfor Eisenhower
and
Churchill desired a secret audience. ”In a matterofhours the overture was made, and the Shah accepted it. He wouldsend a car to Roosevelt’s villa that night at midnight. “Twohours to wait!”Roosevelt thought to himselfafter receiving the message. “I considered my costume. Ifnot appropriate for aroyal audience, it did seem good for these rather peculiar circumstances. I had on a dark turtleneck shirt, Oxfordgray slacks, and apair ofblacktopped givehs,
ropesoled clothcovered Persianfootwear somewhere between shoes and bedroom slippers. Notexactly smart but suitably unobtrusive. ”Roosevelt, who had interviewed the Shah six years earlier whileresearching a book called
Arabs, Oil and History
and had met himagain during subsequent visits toIran, waited for the appointedhour with a handful ofhis agents. He thought it best not to drink, though his comrades had no such scruples. When midnight finally came, he walked through the front gate and out onto the street. Acar was waiting. He climbed into the back seat. Nothing stirred on the streets as Roosevelt was driven towardthe stately palace. As his car began to climb the hill on which thepalace sits, he decided that he should duck out ofsight. His hostshad thoughtfully left a folded blanket on the car seat, and he put itto good use, lying down on the floor and pulling it over him. There was no trouble at the sentry’s gate, just a perfunctory wave. The car continued on for a few moments and then pulled to astop well short ofthe palace’s broad limestone steps. Rooseveltpulled offhis blanket and sat up. A slim figure was walking downthe steps toward him. The man, whom he recognized immediately as the Shah, approached his car, opened the door, and slid in besidehim. Discreetly, the driver withdrew into the shadows. “Good evening, Mr. Roosevelt, ”the monarch said, extending hishand. “I cannot say that I expected to see you, but this is a pleasure. ”Roosevelt told the Shah that he was in Iran on behalfoftheAmerican and British secret services, and that this would be confirmed by a code word the Shah would be able to hear on the BBC

the next night. Churchill had arranged that the BBC would end itsbroadcast day by saying not “It is now midnight, ”as usual, but “It isnow
exactly
midnight. ”
Such assurances were hardly necessary, theShah replied. The two men understood each other. Still, however, the Shah was hesitant to join the plot. He was noadventurer, he told Roosevelt, and could not take the chances of one. Roosevelt’s tone sharpened. He told the Shah that leavingMossadegh in power would “lead only to a Communist Iran or to asecond Korea, ”which Western leaders were not prepared to accept. Toavoid it, they had approved a plot to overthrow Mossadegh—and, incidentally, to increase the power ofthe Shah. He mustembrace it within a few days;ifhe refused, Roosevelt would leavethe country and devise “some other plan. ”The Shah made no direct reply. Let them meet again the following night, he suggested. Then he turned to open the car door. Beforestepping out into the darkness, he looked back at Roosevelt andsaid, “I am glad to welcome you once again to my country. ”From then on, Roosevelt met with the Shah almost every midnight, entering the palace compound under the same blanket in theback seat ofthe same car. Before and after each session, he conferred with his Iranian operatives. When local police became suspicious ofthe villa he was using, he stopped conducting businessthere and devised another way to hold his conferences. He obtaineda Tehran taxi, and at appointed times he would drive it to a quietcorner, always with the “On Call”sign showing. There he wouldpark and begin walking until one or another ofhis agents, usually hyperactive and pumped on the adrenaline ofthe operation, pickedhim up in a Chrysler or a Buick. They planned their daytoday tactics while careening through the hilly outskirts oftown.
Inhis conversations with the Shah, Roosevelt said he had at hisdisposal “the equivalent ofabout $1 million”and several “extremely competent, professional organizers”who could “distribute pamphlets, organize mobs, keep track ofthe opposition—you name it, they’ll do it. ”
He described Operation Ajax as based on “four lines of attack. ”First, a campaign in mosques, the press, and the streets wouldundermine Mossadegh’s popularity. Second, royalist military officerswould deliver the decree dismissing him. Third, mobs would takecontrol ofthe streets. Fourth, General Zahedi would emerge triumphantly and accept the Shah’s nomination as prime minister.

p. 163

Citation :

against Mossadegh. This effort, for which $150, 000 was budgeted, would “create, extend and enhance public hostility anddistrust and fear ofMossadegh and his government. ”It wouldportray Mossadegh as corrupt, procommunist, hostile to Islam, and bent on destroying the morale and readiness ofthe armedforces.

While Iranian agents spread these lies, thugs would be paidtolaunch “staged attacks”on religious leaders and make itappear that they were ordered by Mossadegh or his supporters.

Meanwhile, General Zahedi would persuade and bribe asmany ofhis fellow officers as possible to stand ready for whatever military action was necessary to carry out the coup. He wastobe given $60, 000, later increased to $135, 000, to “win additional friends”and “influence key people. ”

A similar effort, for which $11, 000 per week was budgeted, would be launched to suborn members ofthe Majlis.

On the morning of“coup day, ”thousands ofpaid demonstrators would stage a massive antigovernment rally. The wellprepared Majlis would respond with a “quasilegal”vote todismiss Mossadegh. Ifhe resisted, army units under Zahedi’scontrol would arrest him and his key supporters, and then seizemilitary command posts, police stations, telephone and telegraph offices, radio stations, and the national bank. Working closely with comrades in Washington and Tehran, withwhom they were in constant contact over a Cyprusbased radio network, Wilber and Darbyshire finished this blueprint at the end of May. On June 3 Ambassador Henderson arrived in Washington tobe briefed on its contents. He stayed to attend a crucial meeting onJune 25, at which plans for the coup were laid out in detail. President Eisenhower did not wish to hear details ofcovertoperations and so did not attend this meeting. His closest foreignpolicy advisers, however, were all there. The meeting was held inJohn Foster Dulles’s office at the State Department. When the plotters had assembled, Dulles picked up the report Wilber and Darbyshire had written and said, “So this is how we get rid ofthatmadman Mossadegh!”Kermit Roosevelt explained how he proposed to carry out the

p. 169
Citation :

every agent he could find but also arranged for facsimiles to appearon the front pages ofthe next day’s newspapers. Later he dispatchedtrusted couriers, including two Iranian officers armed with falseidentity papers, to carry copies to military commanders in outlyingcities. Toassure that the
firman
reached as wide an audience as possible, Roosevelt sent a message to the two American news correspondents in Tehran, who represented the Associated Press and the
NewYorkTimes.

Itwas an invitation to a secret meeting with GeneralZahedi. Both eagerly accepted, and a car was dispatched to pickthem up. When they got to the safe house, however, they werebrought not to Zahedi but to his sharpminded son Ardeshir. Hepresented them with copies ofthe
firman
and, in perfect English, delivered an impassioned speech about its importance. Even given the circumstances, it was a very odd meeting. Theman on whose behalfit was called never appeared. Security wasprovided by the host’s young wife, who sat in a rocking chair closetoArdeshir Zahedi with a pistol under her knitting. Most curious tothe reporters, however, was a large and unfamiliar machine that wasclattering loudly nearby. “Lo and behold, there was a huge copying machine, ”KennettLove ofthe
New York Times
recalled later. “Now this was 1953, and acopying machine is about the size oftwo refrigerators. But at thattime neither I nor most American journalists or most Americanpeople would have been able to tell you what the initials CIA stoodfor.
Laughing BySunday afternoon Roosevelt had conceived his new plan. OnMonday and Tuesday his agents would spread across Tehran tobribe politicians, mullahs, and anyone else who might be able toturn out crowds at a crucial moment. During those same two dayshe would send mobs into the street to commit mayhem inMossadegh’s name. Then on Wednesday he would pull his mobs off the street, use military and police units to storm government buildings, and strike the final blow by capturing Mossadegh. Toaccomplish all this, Roosevelt relied on a handful ofprovenIranian agents. Most important were the three Rashidian brothers. Roosevelt had known them for several years, had arranged forthem to be flown to CIA headquarters in Washington for what hecalled “thorough tests oftheir veracity, ”and had developed great


p. 176

Citation :

was time to deliver the speech Roosevelt had devised for him. Hespoke sternly, his voice rising to a crescendo ofstaged indignation. “I must tell you that my fellow citizens are being harassed mostunpleasantly, ”he began. “Not only do they get threatening phonecalls, often answered by their children, who are then subjected torude words children should not even hear;not only are they insulted in the streets when going peacefully about their business. Inaddition to all the verbal aggression they are exposed to, theirautomobiles are damaged whenever they are left exposed. Parts arestolen, headlights are smashed, tires are deflated, and ifthe cars areleft unlocked, their upholstery is cut to pieces. Unless this kind of harassment is stopped, Your Excellency, I am going to ask my government to recall all dependents and also all men whose presencehere is not required in our own national interest. ”Mossadegh might well have laughed at this mendacious monologue. Americans had organized the upheaval in Iran, but Henderson was portraying them as its victims. As proof, he offered highly exaggerated accounts ofsupposed outrages. But amazingly, Mossadegh seemed genuinely pained by these fanciful stories andalarmed at the prospect ofAmericans leaving Iran. Hendersonreported that he was “visibly shaken”and quickly “became confused, almost apologetic. ”Roosevelt had perfectly analyzed his adversary’s psyche. Mossadegh, steeped in a culture ofcourtliness and hospitality, found it shocking that guests in Iran were being mistreated. Thatshock overwhelmed his good judgment, and with Henderson still inthe room, he picked up a telephone and called his police chief. Trouble in the streets had become intolerable, he said, and it wastime for the police to put an end to it. With this order, Mossadegh sent the police out to attack a mobthat included many ofhis own most fervent supporters. Then, toassure that his partisans would not return to the streets the nextday, he issued a decree banning all public demonstrations. He eventelephoned leaders ofprogovernment parties and ordered them tokeep their people at home. He disarmed himself. It was his “fatalmistake, ”according to an account published in
Time
magazine aweek later. Over the next couple ofhours, Mossadegh made several othermissteps. Determined to show how serious he was about cracking

p. 179

Citation :

loincloths. More than a few carried knives or homemade clubs. Itwas as exotic a tribe as ever marched to overthrow a government:
They started with the Zurkaneh giants, weight lifters who developed their physiques through an ancient set ofIranian exerciseswhich included lifting progressively heavier weights. TheZurkanehs had built up tremendous shoulders and huge biceps. Shuffling down the street together, they were a frightening spectacle. Two hundred or so ofthese weightlifters began the day by marching through the bazaar, shouting “Long Live the Shah!”anddancing and twirling like dervishes. Along the edges ofthe crowd, men were passing out tenrial notes. . . . The mob swelled;thechant “Long Live the Shah!”was deafening. As the throng passedthe offices ofa proMossadegh newspaper, men smashed the windows and sacked the place.
Noone tried to stop the insurgents as they marched toward thecity center. Police officers at first encouraged them and then, as theafternoon wore on, began leading them. There was no counterdemonstration. Mossadegh’s supporters, respecting his wish and themessage ofthe previous night’s beatings, had stayed home. The only other group that could have mobilized to defend thegovernment was Tudeh, but its leaders spent the day in meetings, unable to decide whether to act. Mossadegh did not trust them anyway and did not want their help. One Tudeh leader had called himthe day before and volunteered Tudeh shock troops ifMossadeghwould arm them. “Ifever I agree to arm a political party, ”he sworein reply, “may God sever my right arm!”Mossadegh’s hostility was not, however, the real reason Tudehleaders did not call out their street fighters on that crucial day. Likemost ofthe world’s communist parties, Tudeh was controlled by the Soviet Union, and in times ofcrisis it followed orders fromMoscow. On this day, however, no orders came. Stalin had died afew months earlier and the Kremlin was in turmoil. Soviet intelligence officers who would normallybe concentrating on Iran werepreoccupied with the more urgent challenge ofstaying alive. Whether any ofthem even considered trying to defend Mossadeghis among the remaining mysteries ofOperation Ajax. Scholars havesought access to records in Moscow that might resolve it, but theirrequests have been denied.
I KNEW IT! THEY LOVE ME!
179


p. 204

Citation :

Shah’s repressive regime and the Islamic Revolution to the fireballsthat engulfed the World Trade Center in New York. The world has paid a heavy price for the lack ofdemocracy inmost ofthe Middle East. Operation Ajax taught tyrants and aspiring tyrants there that the world’s most powerful governments werewilling to tolerate limitless oppression as long as oppressive regimeswere friendly to the West and to Western oil companies. Thathelped tilt the political balance in a vast region away from freedomand toward dictatorship. Asa postrevolutionary generation came ofage in Iran, Iranianintellectuals began assessing the longterm effects ofthe 1953 coup. Several published thoughtful essays that raised intriguing questions. One appeared in an American foreignpolicy journal:
It is a reasonable argument that but for the coup, Iran would be amature democracy. So traumatic was the coup’s legacy that whenthe Shah finally departed in 1979, many Iranians feared a repetition of1953, which was one ofthe motivations for the studentseizure ofthe U. S. embassy. The hostage crisis, in turn, precipitated the Iraqi invasion ofIran, while the [Islamic] revolutionitselfplayed a part in the Soviet decision to invade Afghanistan. Alot ofhistory, in short, flowed from a single week in Tehran. . . . The 1953 coup and its consequences [were] the starting pointfor the political alignments in today’s Middle East and inner Asia. With hindsight, can anybody say the Islamic Revolution of1979was inevitable? Or did it only become so once the aspirations of the Iranian people were temporarily expunged in 1953?
From the vantage point ofhistory, it is easy to see the catastrophic effects ofOperation Ajax. They will continue to plague theworld for many years. But what would have been the effect of
not
launching the coup? President Truman insisted until his last day inoffice that the United States must not intervene in Iran. What if President Eisenhower had also held this view?Those who defend the coup argue that the Soviet Union waswaiting for a chance to strike against Iran. They say that a preemptive coup was necessary because rolling back a Soviet takeoverwould have been very difficult and perhaps impossible. In theirview, the gamble that the Soviets would not act, or that their actioncould be reversed, was too risky.
204
ALL THE SHAH’S MEN


p. 209212

Citation :

Moscow was directing a relentless campaign ofsubversion aimed atworld domination, that Iran was one ofthis campaign’s likeliest targets, and that the United States had no higher national priority thantoresist and defeat it. They differed profoundly, however, in theirviews ofhow to shape America’s resistance. Truman accepted andeven welcomed the rise ofnationalism in the developing world. Hebelieved that by placing itselfalongside nationalist movements, theUnited States could show the world that it was the truest friend of Asia, Africa, and Latin America. The idea ofoverthrowing foreigngovernments was abhorrent to him, in part because he recognizedthat the longterm consequences were entirely unpredictable andmight well be catastrophic. Truman spent many hours thinking and talking about Iran, butEisenhower was far less engaged. Heallowed the Dulles brothers toshape his administration’s policy toward the restive Third World. They were anxious for quick and visible successes in their anticommunist crusade and saw covert action as a way to achieve them. Preemptive coups, actions against threats that had not yet materialized, seemed to them not only wise but imperative. They did notworry about the future consequences ofsuch coups because they believed that ifthe United States did not sponsor them, its ownfuture would be endangered. The success ofOperation Ajax had an immediate and farreaching effect in Washington. Overnight, the CIA became a centralpart ofthe American foreign policy apparatus, and covert actioncame to be regarded as a cheap and effective way to shape thecourse ofworld events. Kermit Roosevelt could sense this view taking hold even before he had finished delivering his White Housebriefing on September 4, 1953. “One ofmy audience seemed almost alarmingly enthusiastic, ”he wrote afterward. “John Foster Dulles was leaning back in hischair. Despite his posture, he was anything but sleepy. His eyes weregleaming;he seemed to be purring like a giant cat. Clearly he wasnot only enjoying what he was hearing, but my instincts told methat he was planning as well. ”Dulles was indeed planning. The next year he and his brotherorganized the CIA’s second coup d’etat, which led to the fall ofPresident Jacobo Arbenz ofGuatemala and set offa sequence ofeventsin that country that led to civil war and hundreds ofthousands of

violent deaths. Later the CIA set out to kill or depose foreign leadersfrom Cuba and Chile to the Congo and Vietnam. Each oftheseoperations had profound effects that reverberate to this day. Someproduced immense misery and suffering and turned whole regionsofthe world bitterly against the United States. The final question to be answered is why Operation Ajax succeeded. The answer has a great deal to do with luck and happenstance. Hadkey participants made different decisions at any one ofa halfdozendifferent points, the coup would have failed. Kermit Roosevelt might have decided to give up and go homeafter the failed attempt ofAugust 15. More plausibly, Mossadeghand his advisers might have dealt more sternly with the plotters. “Mossadegh should have reacted immediately and had them allshot, ”Shapour Bakhtiar said in an interview years later. That wouldalmost certainly have saved the day, but it was not Mossadegh’snature. The coup might also have failed ifMossadegh had been quickertoorder his police to crack down on the hostile crowds thatRoosevelt and his agents sent into the streets;if, when Mossadeghfinally did order a crackdown, he had chosen a loyal officer ratherthan the outspokenly conservative General Daftary to carry it out;if D
aftary had not intercepted and managed to turn back the loyalistcolumn headed by General Kiani that was on its way to defendthe government;ifthe loyal chiefofstaff, General Riahi, hadmanaged to escape capture and mobilize more loyal units;if Mossadegh had called his supporters onto the streets instead of
ordering them to stay home in the twentyfour hours before thefinal blow was struck;or ifcommunists from the wellorganizedTudeh party had decided to swing into action on Mossadegh’sbehalf. Undoubtedly, there would have been no coup in August 1953 if it had not been for the CIA. The CIA devised Operation Ajax, paid alarge sum to carry it out—estimates ofthe final cost range from$100, 000 to $20 million, depending on which expenses arecounted—and assigned one ofits most imaginative agents to directit. Yet Kermit Roosevelt and his comrades could not have succeededwithout help from Iranians. Two groups provided invaluable help.

First were the Rashidian brothers and other covert agents who hadspent years building the subversivenetwork that Roosevelt foundwaiting for him when he arrived. Second were the military officerswho provided decisive firepower on the climactic day. Iran was falling toward chaos during Mossadegh’s last weeks. British and American agents had worked relentlessly to split theNational Front and the rest ofIranian society, and their effortsproved how vulnerable an undeveloped society can be to a sustained campaign ofbribery and destabilization. Yet Mossadeghhimselfhelped bring Iran to the dead end it reached in mid1953. Itmay be an exaggeration to assert, as some have done, that at somelevel he actually wished to be overthrown. Nonetheless, he had runout ofoptions. Many Iranians sensed this and were ready for a newbeginning. Foreign intelligence agents set the stage for the coup andunleashed the forces that carried it out. At a certain point, however, the operation took on a momentum ofits own. The great mob thatsurged through the streets ofTehran on August 18 was partly mercenary and partly a genuine expression ofpeople’s loss offaith inMossadegh. The CIA laid the groundwork for that day’s events buteven in its own postmortem admitted:“To what extent the resultingactivity stemmed from the specific efforts ofall our agents willnever be known. ”Iranians understood very soon after the coup that foreignershad played a central role in organizing it. In the United States, however, that realization was very slow in coming. Only when antiAmerican hatred exploded in Iran after the Islamic Revolution of 1979 did Americans even realize that their country was unlovedthere. Slowly, they were able to discover the reason why. Just four months after Mossadegh’s overthrow, Richard Nixontraveled to Iran and pronounced himselfmuch impressed withboth Prime Minister Zahedi and Mohammad Reza Shah. PresidentEisenhower was more circumspect. He did not visit Iran until 1959and stayed for just six hours. The Shah gave him a festive welcomeand presented him with a silver peacock inlaid with sapphires andrubies. In private, however, the two leaders had a disagreement thatforeshadowed trouble to come. Eisenhower warned the Shah thatmilitary strength alone could not make any country secure, andurged him to pay attention to his people’s “basic aspirations. ”The

Shah replied that security in the Middle East could be achieved“only by building Iran’s military strength. ”Eisenhower never admitted the American role in OperationAjax. In his memoir, he recalled receiving a briefing about it butsaid it was written, rather than oral, and described Roosevelt as “anAmerican in Iran, unidentified to me. ”He was a bit more candid inhis diary. There he wrote:“The things we did were ‘covert. ’”Headmitted, as he did not in his memoir, that Roosevelt had given hima personal briefing about the coup. “I listened to his detailedreport, ”he wrote, “and it seemed more like a dime novel than historical facts. ”Fortyseven years after the coup, the United States officially acknowledged its involvement. President Bill Clinton, who hadembarked on what proved to be an unsuccessful effort to improveAmerican relations with Iran, approved a carefully worded statement that could be read as an apology. Secretary ofState MadeleineAlbright delivered it during a speech in Washington. “In 1953 the United States played a significant role in orchestrating the overthrow ofIran’s popular prime minister, MohammadMossadegh, ”she said. “The Eisenhower administration believed itsactions were justified for strategic reasons. But the coup was clearly a setback for Iran’s political development. And it is easy to see nowwhy many Iranians continue to resent this intervention by Americain their internal affairs. ”A handful ofAmerican historians have devoted themselves tostudying the 1953 coup and its effects. They agree, to differentdegrees and with different emphases, that the coup defined all of subsequent Iranian history and reshaped the world in ways that areonly now becoming clear. Here are some oftheir observations:
James A. Bill:
American policy in Iran during the early 1950s succeeded in ensuring that there would be no Communist takeoverin the country at the time, and that Iranian oil reserves would beavailable to the Western world at advantageous terms for twodecades afterwards. It also deeply alienated Iranian patriots ofallsocial classes and weakened the moderate, liberal nationalists represented by organizations like the National Front. This paved theway for the incubation ofextremism, both ofthe left and ofthe


_________________
Citation :
One should then look at the world of creation. It started out from the minerals and progressed, in an ingenious, gradual manner, to plants and animals. [...] The animal world then widens, its species become numerous, and, in a gradual process of creation, it finally leads to man, who is able to think and to reflect. The higher stage of man is reached from the world of the monkeys, in which both sagacity and perception are found, but which has not reached the stage of actual reflection and thinking. At this point we come to the first stage of man after (the world of monkeys). This is as far as our (physical) observation extends.


Ibn Khaldoun, Al Mouqaddimah (1377 - Franz Rosenthal translation), Ch.1
Revenir en haut Aller en bas
yassine1985
Colonel-Major
Colonel-Major


messages : 2948
Inscrit le : 11/11/2010
Localisation : Marrakech
Nationalité : Maroc
Médailles de mérite :


MessageSujet: Re: Renseignement & Espionnage   Jeu 6 Déc 2012 - 12:00

Citation :


Russian maps suggest Soviet subs cruised Canadian Arctic


_________________
."قال الرسول صلى الله عليه وسلم : "أيما امرأة استعطرت فمرّت بقوم ليجدوا ريحها فهي زانية
Revenir en haut Aller en bas
MAATAWI
Modérateur
Modérateur


messages : 14775
Inscrit le : 07/09/2009
Localisation : Maroc
Nationalité : Maroc
Médailles de mérite :



MessageSujet: Re: Renseignement & Espionnage   Ven 7 Déc 2012 - 13:12

LaughingLaughing

Citation :
Sudan nabs Israeli 'spy' vulture


Bird captured in Darfur has Khartoum atwitter, as it was found tagged with Israeli Park Services GPS chip. Sudan says bird was on espionage mission; Israel: Chip a standard migration tracker


Three Days of the Condor, Sudan style Sudanese media was a buzz Thursday, with news saying that


The suspect bird was found to be tagged with an Israeli GPS chip and a leg band labeled "Israel Nature Service" and "Hebrew University, Jerusalem."



Khartoum's media claimed that the device was capable of taking photos and sending them back to but Israel's National Parks Service dismissed the allegation, saying that both the band and the GPS chip were nothing more than standard migration trackers.




Tensions between Israel and Sudan have been high since a mysterious

The Opposition in Sudan was quick to mock the "spy bird" find: The country's Justice and Equality Movement featured the news on its website, asking: "How is it possible that the regime was able to detect one vulture, but was unable to detect the jets that bombed the arms facility?"



The website further ridiculed the authorities' report of the case, which lauded it as an "unprecedented achievement," saying that all state reports about the bird's seizure failed to mention whether the vulture was captured because the military's radar picked up on its GPS signal, or whether the bird just happened to be flying by.



Ohad Hazofe, an ecologist with the Israel Nature and Parks Authority, confirmed that the bird was carrying Israeli tags, but said the vulture came to Israel from the Balkans, from which it migrates every year.



Wild birds that visit Israel as part of their migration paths are often tagged with various bands and sometimes GPS chips, to assist ornithologists in their studies.







The bird in question can fly a distance of 600km a day, Hazofe explained. "This is a young vulture that was tagged, along with 100 others, in October. He has two wing bands and a German-made GPS chip."



The device, he stressed, has no photography capabilities. "This equipment that can give out distance and altitude readings only. That's the only way we knew something had happened to the bird – all of a sudden it stopped flying and started traveling on the ground."
www.ynetnews.com/articles/0,7340,L-4316770,00.html

_________________
Le Prophéte (saw) a dit: Les Hommes Les meilleurs sont ceux qui sont les plus utiles aux autres
Revenir en haut Aller en bas
jonas
General de Brigade
General de Brigade


messages : 3321
Inscrit le : 11/02/2008
Localisation : far-maroc
Nationalité : Maroc
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Mar 11 Déc 2012 - 19:34

Citation :

The Federal Security Service of the Russian Federation (FSB) is the main domestic security agency of the Russian Federation and the main successor agency of the Soviet Committee of State Security (KGB). Its main responsibilities are counter-intelligence, internal and border security, counter-terrorism, and surveillance. Its headquarters are on Lubyanka Square, downtown Moscow.

Formed:12 April, 1995
Preceding:agency KGB
Employees:around 200,000–300,000

he FSB is responsible for internal security of the Russian state, counterespionage, and the fight against organized crime, terrorism, and drug smuggling. Since 2003, when the Federal Border Guards Service was incorporated to the FSB, it has also been responsible for overseeing border security.The FSB is engaged mostly in domestic affairs, while espionage duties are responsibility of the Russian Foreign Intelligence Service. However, the FSB also includes the FAPSI agency, which conducts electronic surveillance abroad. All law enforcement and intelligence agencies in Russia work under the guidance of FSB, if needed. For example, the GRU, spetsnaz and Internal Troops detachments of Russian Ministry of Internal Affairs work together with the FSB in Chechnya.
The FSB combines functions and powers similar to those exercised by the United States Federal Bureau of Investigation (FBI), Immigration and Customs Enforcement (ICE), the Federal Protective Service, the Secret Service, the National Security Agency (NSA), U.S. Customs and Border Protection, United States Coast Guard, and Drug Enforcement Administration.
The FSB employs about 66,200 uniformed staff, including about 4,000 special forces troops. It also employs about 160,000–200,000 border guards.



_________________
" les orphelins d'aujourd'hui seront les guerriers de demain !!! " GAZA
Revenir en haut Aller en bas
Yakuza
Administrateur
Administrateur


messages : 21624
Inscrit le : 15/09/2009
Localisation : 511
Nationalité : Maroco-Allemand
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Mer 12 Déc 2012 - 14:55

quand les donneurs de lecons assassinaient des militants de DH..

Citation :
UK's David Cameron says British agents played a key role in NIreland human rights lawyer death

Article by: Associated Press
Updated: December 12, 2012 - 7:29 AM


LONDON - British Prime Minister David Cameron on Wednesday condemned actions by British agents in the 1989 death of a Belfast lawyer, one of the most bitterly disputed killings of the entire Northern Ireland conflict.

Cameron cited a long-awaited report on the slaying that said there was a shocking level of state collusion with an outlawed Protestant group in the murder of Pat Finucane, who specialized in defending Irish Republican Army suspects.

Two gunmen from the Ulster Defense Association shot him more than a dozen times in his Belfast home as he was having Sunday lunch with his wife and three children. Employees of the state and state agents played "key roles" in the murder, the report says.

"It cannot be argued that these were rogue agents," Cameron said. However, he declined to order an inquiry, describing the report as extensive.

Previous investigations already have confirmed that both the British Army and the anti-terrorist unit of Northern Ireland's police had agents and informers inside the UDA involved in the killing.

_________________
Revenir en haut Aller en bas
MAATAWI
Modérateur
Modérateur


messages : 14775
Inscrit le : 07/09/2009
Localisation : Maroc
Nationalité : Maroc
Médailles de mérite :



MessageSujet: Re: Renseignement & Espionnage   Mar 26 Fév 2013 - 11:10

Citation :
Digital Spying Burdens German-Chinese Relations
Very few companies in Europe are as strategically important as the European Aeronautic Defense and Space Company (EADS). It makes the Eurofighter jet, drones, spy satellites, and even the carrier rockets for French nuclear weapons.
Not surprisingly, the German government reacted with alarm last year when EADS managers reported that their company, which has its German administrative headquarters near Munich, was attacked by hackers. The EADS computer network contains secret design plans, aerodynamic calculations and cost estimates, as well as correspondence with the governments in Paris and Berlin. Gaining access to the documents would be like hitting the jackpot for a competitor or a foreign intelligence agency.

The company's digital firewalls have been exposed to attacks by hackers for years. But now company officials say there was "a more conspicuous" attack a few months ago, one that seemed so important to EADS managers that they chose to report it to the German government. Officially, EADS is only confirming there was a "standard attack," and insists that no harm was done.
The attack isn't just embarrassing for the company, which operates in an industry in which trust is very important. It also affects German foreign policy, because the attackers were apparently from a country that has reported spectacular growth rates for years: China.
During a visit to Guangzhou during February 2012, German Chancellor Angela Merkel praised China's success, saying it is something "that can be described as a classic win-win situation."
But the chancellor could be wrong.
For some time now, the relationship between China and the West seems to have been producing one winner and many losers. China is routinely the winner, while the losers are from Germany, France and the United States. They are global companies that are eviscerated by Chinese hackers and learn the painful lesson of how quickly sensitive information can end up in the Far East.
Berlin's Dilemma
The relentless digital attack plunges the German government into a political dilemma. No government can stand back while another country unscrupulously tries to steal its national secrets. It has to protect the core of the government and the know-how of the national economy, sometimes with severe methods, if the diplomatic approach proves ineffective. Berlin should threaten Beijing with serious consequences, like the ones the US government announced last week.
On the other hand, the German government doesn't want to mar relations with one of its most important international partners. China has become Germany's third-largest trading partner and, from Merkel's perspective, is now much more than a large market for German goods and supplier of inexpensive products. Berlin now views the leadership in Beijing as its most important non-Western political partner.
That may explain why Merkel is addressing the Chinese problem abstractly rather than directly. During the high-level government meetings last August, she reminded the Chinese of the importance of "abiding by international rules." When she sent a representative to Beijing in November to tell senior government officials that Germany condemned the cyber espionage, it was done informally and off the record. In the end, Merkel will accept the ongoing espionage attempts as a troublesome plague that Germany simply has to put up with.
When SPIEGEL first exposed the scope of the Chinese attacks five-and-a-half years ago, then-Prime Minister Wen Jiabao asserted that his government would "take decisive steps to prevent hacker attacks."
But the problem has only gotten worse since then.
1,100 Attacks in 2012
Last year, Germany's domestic intelligence agency, the Federal Office for the Protection of the Constitution, reported close to 1,100 digital attacks on the German government by foreign intelligence agencies. Most were directed against the Chancellery, the Foreign Ministry and the Economics Ministry. In most cases, the attacks consist of emails with attachments containing a Trojan horse. Security officials noticed that the attacks were especially severe in the run-up to the G-20 summit, targeting members of the German delegation and focusing on fiscal and energy policy. The Green Party has also been targeted before.
In mid-2012, hackers attacked ThyssenKrupp with previously unheard of vehemence. The attempts to infiltrate the steel and defense group's corporate network were "massive" and of "a special quality," say company officials. Internally, the subject was treated as a top-secret issue. The hackers had apparently penetrated so deeply into the company's systems that executives felt it was necessary to notify authorities. ThyssenKrupp told SPIEGEL that the attack had occurred "locally in the United States," and that the company did not know whether and what the intruders may have copied. It did know, however, that the attacks were linked to Internet addresses in China.
Hackers have also apparently targeted pharmaceutical giant Bayer and IBM, although IBM isn't commenting on the alleged attacks. In late 2011, a German high-tech company, the global market leader in its industry, received a call from security officials, who said that they had received information from a friendly intelligence service indicating that large volumes of data had been transferred abroad.
The investigations showed that two packets of data were in fact transmitted in quick succession. The first was apparently a trial run, while the second one was a large packet containing a virtually complete set of company data: development and R&D files, as well as information about suppliers and customers. An external technology service provider had copied the data and apparently sold it to Chinese nationals.
Seventy Percent of German Companies Under Threat




"Seventy percent of all major German companies are threatened or affected" by cyber attacks, Stefan Kaller, the head of the department in charge of cyber security at the German Interior Ministry, said at the European Police Congress last week. The attacks have become so intense that the otherwise reserved German government is now openly discussing the culprits. "The overwhelming number of attacks on government agencies that are detected in Germany stem from Chinese sources," Kaller said at the meeting. But the Germans still lack definitive proof of who is behind the cyber attacks.
The hackers' tracks lead to three major Chinese cities: Beijing, Shanghai and Guangzhou. And from Germany's perspective, they point to a Unit 61398, which was identified in a report by the US cyber security company Mandiant last week.
In the dossier, which is apparently based on intelligence information, the Washington-based IT firm describes in detail how a unit of the Chinese People's Liberation Army has hacked into 141 companies worldwide since 2006. The trail, according to Mandiant, leads to an inconspicuous 12-story building in Beijing's Pudong district, home to the army's Unit 61398.

www.spiegel.de/international

_________________
Le Prophéte (saw) a dit: Les Hommes Les meilleurs sont ceux qui sont les plus utiles aux autres
Revenir en haut Aller en bas
MAATAWI
Modérateur
Modérateur


messages : 14775
Inscrit le : 07/09/2009
Localisation : Maroc
Nationalité : Maroc
Médailles de mérite :



MessageSujet: Re: Renseignement & Espionnage   Mar 26 Mar 2013 - 12:33

Citation :
Former L-3 engineer gets 6 years prison over China exports


* Sixing Liu accused of stealing thousands of computer files

* Files said to have details on missiles, rockets, drones

* Defendant plans to appeal

By Jonathan Stempel

March 25 (Reuters) - A Chinese national and former L-3 Communications Holdings Inc engineer was sentenced on Monday to nearly six years in prison following his conviction for illegally exporting details of sensitive U.S. military technology to China.

Sixing Liu, 49, had been convicted in September by a federal jury in Newark, New Jersey, on nine of 11 counts, including possession of stolen trade secrets, violating the Arms Export Control Act and lying to federal agents.

Prosecutors said the defendant, who is also known as Steve Liu, stole thousands of computer files that detailed the performance and design of guidance systems for missiles, rockets and unmanned drones.

Liu then made several presentations at Chinese universities and government-organized conferences about the technology without L-3's permission, hoping it would eventually help him get a job in China, prosecutors said.

"Instead of the accolades he sought from China, Sixing Liu today received the appropriate reward for his threat to our national security: 70 months in prison," Paul Fishman, the U.S. Attorney in New Jersey, said in a statement.

The sentence was imposed by U.S. District Judge Stanley Chesler in Newark, with restitution to be determined later.

Liu has been in custody since the verdict. Prosecutors said he was a risk to flee.

James Tunick, a lawyer for Liu, said in a phone interview he plans to appeal the conviction and sentence.

"Dr. Liu made a mistake by having these files on his computer, but we have always maintained that it didn't rise to the level of a criminal act," Tunick said. "He surely did not intend to harm the interests of the United States."

Tunick said Liu's sentence was in the middle of the 63- to 78-month term recommended under federal sentencing guidelines. He said he had requested a prison sentence of one year and one day for his client, including the six months already spent in custody.

Liu had worked in L-3's space and navigation unit in Budd Lake, New Jersey, from March 2009 until November 2010.

Prosecutors said federal agents found Liu at Newark Liberty International Airport on Nov. 29, 2010, as he returned from a trip to Shanghai, in possession of a private computer containing the stolen material.

L-3 was not a defendant in the case, and has said it cooperated with authorities.

The case is U.S. v. Liu, U.S. District Court, District of New Jersey, No. 12-cr-00349.

_________________
Le Prophéte (saw) a dit: Les Hommes Les meilleurs sont ceux qui sont les plus utiles aux autres
Revenir en haut Aller en bas
annabi
Général de coprs d'armée فريق (ANP)
Général de coprs d'armée فريق  (ANP)


messages : 6940
Inscrit le : 18/07/2012
Localisation : paris
Nationalité : Algerie-Francais
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Mer 21 Aoû 2013 - 16:30

Citation :
La NSA serait en mesure de surveiller 75 % du trafic sur Internet aux Etats-Unis




La National Security Agency (NSA) a la capacité de surveiller 75 % du trafic sur Internet aux Etats-Unis, écrit mercredi 21 août le Wall Street Journal. Citant d'actuels et anciens responsables de la NSA, le quotidien souligne que ce chiffre est supérieur à celui qui avait été fourni par les autorités après les révélations d'Edward Snowden sur les programmes de surveillance américains.
Début août, la NSA jurait dans un communiqué de sept pages ne s'intéresser qu'à 1,6 % des données circulant sur Internet, dont seulement 0,025 % est "effectivement sélectionné pour un examen".

"Autrement dit, si l'environnement mondial des communications était représenté par un terrain de basket classique, la collecte de la NSA équivaudrait à une surface de la taille d'une pièce de 10 cents sur ce terrain."


Le Wall Street Journal ajoute que la NSA conserve le contenu de certains emails envoyés par des citoyens américains, et qu'elle filtre les appels locaux passés par Internet. Dès lors qu'elle dispose d'un mandat signé par un juge, l'agence est ainsi en mesure d'intercepter pratiquement toutes les informations qui existent en ligne, conclut le titre.
Interrogée par Reuters, la NSA a répondu que sa mission de renseignement "se concentre sur la lutte contre les ennemis étrangers qui veulent porter atteinte au pays". "Nous défendons les Etats-Unis contre de telles menaces tout en travaillant avec acharnement à la protection de la vie privée des Américains. Ce n'est pas l'un ou l'autre. Ce sont les deux à la fois".
RÉVÉLATIONS EN CASCADE
Ces nouvelles révélations de la presse anglo-saxone viennent s'ajouter à une liste qui s'allonge chaque semaine. Auparavant, le Washington Post, s'appuyant sur une analyse d'un audit interne, rapportait que la NSA avait commis des "milliers" d'infractions aux lois sur le respect de la vie privée depuis qu'elle a été dotée de nouveaux pouvoirs en 2008.
Mardi, le quotidien britannique The Guardian, parmi les premiers à diffuser les documents secrets obtenus auprès de l'ancien consultant Edward Snowden, a raconté les pressions du gouvernement britannique, qui l'a notamment obligé à détruire des disques durs.
Quant à David Miranda, le mari du journaliste Glenn Greenwald arrêté à Londres par la police, il a indiqué son intention de porter plainte contre le ministère de l'intérieur. M. Miranda a été arrêté à sa sortie de l'avion, questionné pendant huit heures et cinquante-cinq minutes dans l'aéroport londonien d'Heathrow, avant d'être délesté de ses effets personnels, puis relâché.
Son récit pourrait figurer sur le site Schedule 7 Stories ("histoires de l'article 7"), qui compile les témoignages de "communautés suspectes" victimes de contrôles aux frontières jugés abusifs au nom de l'article 7, clé de voûte de la législation antiterroriste britannique.

http://www.lemonde.fr/technologies/article/2013/08/21/la-nsa-est-en-mesure-de-surveiller-75-du-trafic-internet-aux-etats-unis_3464078_651865.html
Revenir en haut Aller en bas
juba2
General de Division
General de Division


messages : 6778
Inscrit le : 02/04/2008
Localisation : USA
Nationalité : MoroccanUS
Médailles de mérite :



MessageSujet: Re: Renseignement & Espionnage   Mer 21 Aoû 2013 - 21:02

annabi a écrit:
Citation :
La NSA serait en mesure de surveiller 75 % du trafic sur Internet aux Etats-Unis




La National Security Agency (NSA) a la capacité de surveiller 75 % du trafic sur Internet aux Etats-Unis, écrit mercredi 21 août le Wall Street Journal. Citant d'actuels et anciens responsables de la NSA, le quotidien souligne que ce chiffre est supérieur à celui qui avait été fourni par les autorités après les révélations d'Edward Snowden sur les programmes de surveillance américains.
Début août, la NSA jurait dans un communiqué de sept pages ne s'intéresser qu'à 1,6 % des données circulant sur Internet, dont seulement 0,025 % est "effectivement sélectionné pour un examen".

"Autrement dit, si l'environnement mondial des communications était représenté par un terrain de basket classique, la collecte de la NSA équivaudrait à une surface de la taille d'une pièce de 10 cents sur ce terrain."


Le Wall Street Journal ajoute que la NSA conserve le contenu de certains emails envoyés par des citoyens américains, et qu'elle filtre les appels locaux passés par Internet. Dès lors qu'elle dispose d'un mandat signé par un juge, l'agence est ainsi en mesure d'intercepter pratiquement toutes les informations qui existent en ligne, conclut le titre.
Interrogée par Reuters, la NSA a répondu que sa mission de renseignement "se concentre sur la lutte contre les ennemis étrangers qui veulent porter atteinte au pays". "Nous défendons les Etats-Unis contre de telles menaces tout en travaillant avec acharnement à la protection de la vie privée des Américains. Ce n'est pas l'un ou l'autre. Ce sont les deux à la fois".
RÉVÉLATIONS EN CASCADE
Ces nouvelles révélations de la presse anglo-saxone viennent s'ajouter à une liste qui s'allonge chaque semaine. Auparavant, le Washington Post, s'appuyant sur une analyse d'un audit interne, rapportait que la NSA avait commis des "milliers" d'infractions aux lois sur le respect de la vie privée depuis qu'elle a été dotée de nouveaux pouvoirs en 2008.
Mardi, le quotidien britannique The Guardian, parmi les premiers à diffuser les documents secrets obtenus auprès de l'ancien consultant Edward Snowden, a raconté les pressions du gouvernement britannique, qui l'a notamment obligé à détruire des disques durs.
Quant à David Miranda, le mari du journaliste Glenn Greenwald arrêté à Londres par la police, il a indiqué son intention de porter plainte contre le ministère de l'intérieur. M. Miranda a été arrêté à sa sortie de l'avion, questionné pendant huit heures et cinquante-cinq minutes dans l'aéroport londonien d'Heathrow, avant d'être délesté de ses effets personnels, puis relâché.
Son récit pourrait figurer sur le site Schedule 7 Stories ("histoires de l'article 7"), qui compile les témoignages de "communautés suspectes" victimes de contrôles aux frontières jugés abusifs au nom de l'article 7, clé de voûte de la législation antiterroriste britannique.

http://www.lemonde.fr/technologies/article/2013/08/21/la-nsa-est-en-mesure-de-surveiller-75-du-trafic-internet-aux-etats-unis_3464078_651865.html

Plutot du monde:file:  je file je file 
Revenir en haut Aller en bas
annabi
Général de coprs d'armée فريق (ANP)
Général de coprs d'armée فريق  (ANP)


messages : 6940
Inscrit le : 18/07/2012
Localisation : paris
Nationalité : Algerie-Francais
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Ven 30 Aoû 2013 - 17:12

Citation :
Espionnage : le "budget noir" américain rendu public




La CIA, la puissante agence américaine de renseignement, a demandé un budget de 14,7 milliards de dollars en 2013 et ses effectifs dépassent les 21 000 personnes, révèle le Washington Post jeudi 29 août sur la base d'un document fourni par Edward Snowden.
Pour la première fois, le détail du budget des seize agences de renseignement américaines, surnommé le "budget noir" des Etats-Unis, a été rendu public, permettant de comprendre comment les ressources sont réparties au sein de l'immense communauté du renseignement.
Seul le montant global est publié chaque année par le gouvernement. En 2012, il était de 55 milliards de dollars. Pour l'année budgétaire 2013, le gouvernement réclamait 52,6 milliards au Congrès, et pour 2014 il a demandé 48,2 milliards. A cela s'ajoutent encore les programmes de renseignement militaire du Pentagone (23 milliards en 2013 et 14 milliards demandés pour 2014).
Au total, 107 035 personnes sont employées dans l'une des différentes agences de renseignement américaines, dont près de 35 000 dans des fonctions de cryptographie, ce qui inclut l'Agence de sécurité nationale (NSA), chargée des écoutes mondiales et de la surveillance électronique.





LA CORÉE DU NORD EN TÊTE DES "TROUS"
Après la CIA (14,7 milliards de dollars), la NSA (10,8 milliards) et le National Reconnaissance Office (NRO, 10,3 milliards) sont les agences les mieux dotées. Le NRO gère les satellites d'espionnage américains.
Le budget évalue aussi les "trous" du renseignement américain, ces dossiers où les Etats-Unis reconnaissent manquer d'informations. En tête figure la Corée du Nord. Un chapitre du document révèle que le pays est surveillé "en permanence" via photos, échantillons d'air et imagerie infrarouge pour détecter l'activité nucléaire du régime communiste.
LA TRAQUE DE BEN LADEN
Ces documents mettent également indirectement en lumière le rôle des satellites et des interceptions électroniques dans la traque d'Oussama ben Laden en 2011. S'ils "ne font que de brèves références à l'opération ben Laden", affirme le Post, ils illustrent le rôle des diverses agences de renseignement dans la traque de l'ancien chef d'al-Qaïda, tué lors d'une opération commando américaine contre sa résidence d'Abbottabad, au Pakistan, le 1er mai 2011.
L'un des documents montre ainsi que les satellites espions du National Reconnaissance Office (NRO) ont effectué 387 "collectes" d'images haute-résolution et infrarouge du complexe dans lequel se terrait ben Laden dans le mois qui a précédé le raid. La résidence d'Abbottabad avait été identifiée à la suite de filatures d'un homme dont Washington pensait qu'il était un messager du chef d'al-Qaïda. Cette surveillance satellitaire a été "cruciale pour préparer la mission et a contribué à la décision de l'exécuter", affirme l'un des documents, cité par le quotidien.

La NSA, l'agence chargée des interceptions téléphoniques et électroniques, avait de son côté mis en place un groupe spécialisé dans la mise au point et l'installation de logiciels espions sur les ordinateurs et téléphones portables de membres d'al-Qaïda soupçonnés de pouvoir renseigner les Etats-Unis sur le repaire de ben Laden. Lors de l'opération d'Abbottabad, les Navy Seals ont récupéré quantité de documents et disques durs. En septembre 2011, les services de renseignement ont dû prévoir un budget de 2,5 millions de dollars pour être en mesure de les analyser, rapporte encore le Washington Post.
1 % DU PIB AMÉRICAIN
Au total, le document illustre le doublement du budget total du renseignement depuis les attentats du 11 septembre 2001, avec une facture estimée à plus de 500 milliards de dollars depuis 2001. "Le monde actuel est plus instable qu'il ne l'a jamais été depuis un demi-siècle", a déclaré au Washington Post James Clapper, directeur du renseignement national. "Même avec l'augmentation des dépenses pour la communauté du renseignement, les Etats-Unis dépensent moins de 1 % du PIB pour le renseignement."
Edward Snowden est actuellement en Russie, où il a reçu l'asile temporaire. Ses documents, récupérés lorsqu'il travaillait pour la NSA comme administrateur systèmes, ont été exploités graduellement par The Guardian et le Washington Post depuis les premières révélations de juin.

http://www.lemonde.fr/ameriques/article/2013/08/29/espionnage-le-budget-noir-des-etats-unis-rendu-public_3468693_3222.html
Revenir en haut Aller en bas
annabi
Général de coprs d'armée فريق (ANP)
Général de coprs d'armée فريق  (ANP)


messages : 6940
Inscrit le : 18/07/2012
Localisation : paris
Nationalité : Algerie-Francais
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Mer 16 Oct 2013 - 23:25

Citation :
IP : mesurez-vous vraiment tout ce qu'il est possible de savoir de vous sur le net ?

Alors qu’on vient de se rendre compte, par des révélations du Washington Post, que la NSA collecte des centaines de millions de listes de contacts, un arrêté vient d'établir en France qu'il en coûte, entre autre - 4 euros aux autorités pour obtenir l'adresse IP d'un citoyen. Big Brother nous regarde donc déjà...

Atlantico : Alors que le Washington Post a révélé lundi 14 octobre, citant des documents d’Edward Snowden, que l’Agence de sécurité nationale américaine (NSA) collecte des centaines de millions de listes de contacts, vient de paraitre en France une tarification de ce que paient les autorités pour accéder à des informations sur les citoyens français (voir ici le détail tarifaire de votre vie privée). Notre société, par le biais d'organisation comme la NSA, est-elle en train de devenir une "société de surveillance" ? Si oui, quelles en sont les principales caractéristiques ?
Fabrice Epelboin : On est déjà dans la société de surveillance. Ce qui change est la perception du public, quel est le régime politique dans lequel on vit. Il y a une multitude de dimensions dans cette société de surveillance avec des systèmes (comme INDECT en Europe) qui consistent à relier entre elles les caméras de surveillance et permettent de traquer la population en temps réel ; ou la surveillance des communications des individus et des citoyens dans une multitude de pays dans le monde. On n’assiste donc pas à une transformation. La seule différence est qu’on n’est pas encore dans une période de crise aiguë, même si en France on s’en rapproche. Cette mise sous surveillance vise à ce qu’il n’y ait pas de perturbations sociales comme une révolution au Qatar ou des mouvements sociaux en France.
Quelle est l’ampleur de la surveillance sur le web ? La NSA surveille-t-elle absolument tout le trafic sur internet ?
La NSA surveille quasiment tout et à accès a l’essentiel des échanges entre individus sur Terre. L’Afrique et le Moyen-Orient sont essentiellement connectés au reste du monde à travers des points de connexion français que la NSA voit un peu moins bien mais à part cela, elle voit tout.
Qui sont les autres acteurs de cette surveillance organisée ?
Il y a des acteurs étatiques : la NSA, la CIA, le FBI et d’autres agences dont on n’a jamais entendu parler mais aussi des acteurs privés qui offrent divers services - comme des technologies - à ces agences de surveillance. Toutefois, il y a une grosse différence entre la doctrine française et la doctrine américaine. En France, ce que l'on pourrait appeler l’appareil industriel de surveillance a une relation très subtile avec l’Etat. Les technologies françaises sont faites d'un étrange mélange, ce sont des technologies des entreprises privées mais mises en œuvre par l’Etat.
Cependant, un regard sur notre histoire nous montre que cette société de la surveillance a eu des formes récentes et sombres. La France a par exemple eu un rôle important dans le développement de la tabulatrice Bull, pionnière de la mécanographie, qui a servi à établir le fichier juif sous Vichy... A nouveau la démocratie est menacée à nouveau et la France qui a avancé dans l'illusion démocratique mais est incapable de voir son histoire. Pire, il a fallu l'affaire Prism que la presse traditionnelle parle du sujet...


Les arguments de la sécurité et de la cyberguerre ont bon dos car la réalité est qu’on s’équipe contre les populations civiles. Demain, on peut avoir des émeutes racistes et on est en train de donner aux gouvernances le pouvoir de se maintenir sans aucun contrôle. On ne peut pas appeler cela une démocratie.
A qui profite cette surveillance et quel est le réel objectif de cette collecte d’informations ? Le but de la NSA est-il de pouvoir tout savoir sur tout le monde ou simplement de conserver une banque de données ?
Il y a eu au départ une demande modérément forte de certaines dictatures qui avaient senti qu’internet était dangereux car il permettait la liberté d’expression. Elles avaient l’avantage d’avoir des architectures de réseau très simples. Il était donc plus facile de mettre sous surveillance la Tunisie et la Libye. Avec le printemps arabe, la demande a explosé, ce qui crée un gigantesque marché. Cela profite à toute une industrie mais aussi à des gouvernements qui veulent assurer leur stabilité en cherchant à identifier les mouvements de foule, les opposants politiques etc.
Le but de la NSA est de lutter contre le terrorisme certes mais aussi de faire de l’espionnage industriel pour favoriser l’économie américaine et/ou faire de la surveillance diplomatique pour avoir un avantage lors de négociations internationales. Leur but est d’avoir la vision la plus large de ce qui se passe dans le monde et de comprendre finement les enjeux spécifiques comme des problématiques diplomatiques, c’est pour cette raison qu’ils ont mis sous surveillance le quai d’Orsay par exemple.
Le réseau Tor permet de naviguer de façon anonyme sur internet. En dehors de ce réseau de protection, comment se protéger contre cette surveillance accrue ?
Le réseau Tor est un élément de protection contre la surveillance mais ne protège pas complètement. Il faut comprendre les enjeux de la surveillance pour se mettre à l’abri et aucun logiciel ne permet de se protéger de la NSA. On peut utiliser divers protocoles comme OTR qui permet d’assurer le cryptage complet de la communication. On peut utiliser divers dispositifs techniques mais il n’y en a pas un seul. La meilleure façon de protéger une source est de ne pas la connaitre, c’est le principe de Wikileaks. 

http://www.atlantico.fr/decryptage/4-euros-pour-obtenir-votre-adresse-ip-mesurez-vraiment-tout-qu-est-possible-savoir-net-fabrice-epelboin-871733.html
Citation :
Un gigantesque centre d’espionnage en construction dans le désert américain


Dans la petite ville de Bluffdale, au creux d’une vallée reculée de l’Utah, cœur du pays mormon américain, la National Security Agency (NSA) construit actuellement le plus grand centre de collecte et d’analyse de données des Etats-Unis, auquel le magazine Wired consacre sa couverture cette semaine.
Ce centre puissamment gardé devrait être opérationnel en septembre 2013. La NSA a consacré 2 milliards d’euros au chantier, qui doit permettre d’abriter quatre halls à serveurs de 2 300 mètres carrés chacun, plus 8 hectares de bâtiments destinés au support technique et à l’administration du site. L’ensemble sera complètement autosuffisant. 
Des réservoirs d’essence seront capable d’alimenter des générateurs de secours trois jours durant ; des installations de pompage d’eau pourront produire 6,4 millions de litres d’eau par jour, un système d’égouts et d’air conditionné aidera à maintenir ces serveurs à une température raisonnable. L’électricité sera fournie par une station autonome de 65 mégawatts, pour un coût total énergétique de 40 million de dollars par an (30 millions d’euros), selon une estimation publiée par Wired.
L’objectif de cette Babel du renseignement est de capter, décoder et analyser des données issues de communications classiques (courriels, conversations téléphoniques, recherches sur Google), de tous types de données personnelles (factures de parking, itinéraires de voyages, achats en librairies…) et de données issues du « Web profond », non directement accessible (informations financières, transactions boursières, accords commerciaux, communications militaires et diplomatiques étrangères, documents légaux, informations personnelles confidentielles…).

En 2005, le New York Times avait déjà révélé que la NSA s’était lancée sans mandat juridique dans un vaste programme d’écoute des communications sur le sol américain, depuis l’échec cuisant du 11 septembre. L’institution, créée comme un outil du ministère de la défense après le désastre de Pearl Harbor, avait entrepris une profonde refonte de son travail, dont ce centre est un aboutissement. « Même s’il y a peu de preuves que la NSA soit aujourd’hui plus efficace — après tout, malgré de nombreuses opportunités, elle a raté la tentative d’attaque du « terroriste en caleçon » en vol pour Détroit en 2009, et l’attentat à la voiture piégée de Times Square en 2010 — il n’y a pas de doute sur le fait qu’elle est devenue l’agence de renseignement la plus vaste, la plus secrète et potentiellement intrusive jamais créée, » écrit Wired.
Le centre de données de l’Utah puise ses sources en se branchant directement sur les « prises » des compagnies de télécommunications (un système déjà exposé par le New York Times en 2005) en surveillant les stations terrestres du réseau AT&T, de gigantesques paraboles qui gèrent les communications entre Etats-Unis, l’Europe, le Moyen-Orient, l’Asie et la zone Pacifique.
Pour décoder les données protégées ainsi collecter, la NSA travaille avec un superordinateur, situé dans le « bâtiment 5 300″ du centre de Bluffdale, appelé sobrement « Zone de recherche multiprogrammes ». Des responsables de la NSA ayant participé à la création du site déclarent à Wired que l’équipe en charge du décryptage a récemment réussi « une percée » technologique, mais qu’elle a besoin de plus de capacité de traitement pour la mettre en action. C’est dans l’Utah qu’elle prévoit de le faire.
La NSA souhaiterait mettre en route un ordinateur capable de coordonner la collecte, la lecture et le classement de ces milliards de données à travers le monde d’ici 2018. Selon l’un des responsables anonymes cités par Wired : « Tout le monde est une cible ; toute personne qui communique est une cible. »

http://www.wikibusterz.com/un-gigantesque-centre-despionnage-en-construction-dans-le-desert-americain/
Revenir en haut Aller en bas
annabi
Général de coprs d'armée فريق (ANP)
Général de coprs d'armée فريق  (ANP)


messages : 6940
Inscrit le : 18/07/2012
Localisation : paris
Nationalité : Algerie-Francais
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Jeu 17 Oct 2013 - 22:49

Documentaire - Israël/Palestine : la guerre secrète du Mossad

Revenir en haut Aller en bas
juba2
General de Division
General de Division


messages : 6778
Inscrit le : 02/04/2008
Localisation : USA
Nationalité : MoroccanUS
Médailles de mérite :



MessageSujet: Re: Renseignement & Espionnage   Ven 18 Oct 2013 - 4:13

OLP et CIA travaillaient ensemble
Revenir en haut Aller en bas
annabi
Général de coprs d'armée فريق (ANP)
Général de coprs d'armée فريق  (ANP)


messages : 6940
Inscrit le : 18/07/2012
Localisation : paris
Nationalité : Algerie-Francais
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Ven 18 Oct 2013 - 22:48

Citation :
La NSA au cœur des assassinats ciblés américains



S'appuyant sur les documents fournis par l'ex-agent de l'Agence nationale de sécurité (NSA) Edward Snowden, le Washington Post continue à livrer de nouvelles informations sur l'ampleur des programmes de surveillance de l'agence américaine de renseignement.

Dans son édition de jeudi, le quotidien américain met en évidence le rôle central joué par l'agence dans les assassinats menés par les Etats-Unis au Moyen-Orient. Jusqu'à présent, la CIA était considérée comme le principal acteur de ce programme controversé, notamment en raison de l'emploi massif de drones, au Yémen ou au Pakistan.
Les documents qu'a consultés le Washington Post éclairent en particulier le cas de Hassan Ghul, un responsable d'Al-Qaida constituant une des cibles prioritaires de l'administration américaine, éliminé par une frappe de drone en octobre 2012. C'est l'interception par la NSA d'un courriel envoyé par sa femme qui a fourni des informations cruciales permettant de le localiser, justifiant le déploiement sur une année entière d'un véritable "arsenal", de la prise de contrôle d'ordinateurs portables jusqu'au suivi de transmissions radio.
LA NSA, L'ÉGALE DE LA CIA
Cet exemple montre que la NSA, forte de ses impressionnantes capacités de renseignement électronique, joue un rôle au moins aussi important que la CIA sur ces dossiers. Elle a même mis en place une cellule spéciale, dont les ressources sont dédiées à la localisation et à la traque des cibles terroristes les plus coriaces.

Cette interdépendance entre NSA et CIA est très forte : là où la seconde peut envoyer des agents mener des missions d'infiltration à haut risque sur le terrain, la cellule mise en place par la première représente "dix fois les effectifs, vingt fois le budget et cent fois la matière grise" de son équivalent au sein de la CIA.
L'INTERCEPTION CIBLÉE PLUS EFFICACE
Les documents en question apportent peu de précisions sur les techniques exactes déployées par la NSA pour repérer M. Ghul. Ce sont avant tout des attaques ciblées et des infiltrations extrêmement techniques réalisées "sur mesure" par la NSA qui se sont avérées les plus utiles. Davantage, note le Washington Post, que les outils qui ont fait scandale depuis leur révélation, tels que Prism, le programme informatique mis en place par la NSA pour scanner les communications numériques échangées sur plusieurs services en ligne parmi les plus populaires.

Selon un document transmis au Washington Post, l'une de ces opérations ciblées a par exemple permis à la NSA de récupérer "quatre-vingt-dix documents chiffrés, seize clés de chiffrement, trente messages non chiffrés et des centaines d'historiques de discussions instantanées".
En réaction, une porte-parole de l'agence a estimé que les opérations de la NSA "protègent la nation et ses intérêts de menaces comme le terrorisme et la prolifération des armes de destruction massive" en récoltant des "renseignements sur des cibles étrangères".

http://www.lemonde.fr/technologies/article/2013/10/17/la-nsa-au-c-ur-des-assassinats-cibles-americains_3497747_651865.html?goback=%2Egde_4722593_member_5796716648530460672#%21
Citation :
La NSA a largement exagéré le nombre d'attentats qu'elle aurait déjoué



Interrogé par la commission du renseignement du Sénat, Keith Alexander, le patron de l'Agence nationale de sécurité américaine (NSA), a admis, mardi 15 octobre, que le nombre d'attentats potentiels déjoués par son vaste système de surveillance était bien moindre qu'annoncé dans un premier temps.
Peu de temps après les révélations des méthodes utilisées par la NSA grâce aux documents d'Edward Snowden, M. Alexander avait assuré que pas moins de 54 "complots ou événements" avaient été repérés et déjoués "dans plus de 20 pays à travers le monde", grâce, notamment, à ces interceptions téléphoniques. Devant les sénateurs démocrates Mark Udall et Patrick Leahy, il a reconnu que seule un ou deux complots avaient été réellement déjoués, rapporte le site spécialisé The State Weekly.
"La preuve ne nous a jamais été apportée que la collecte en vrac de données a fourni des renseignements de valeur ayant conduit individuellement à déjouer des attentats", avait dit dès septembre M. Udall.
La commission du renseignement prépare depuis septembre une loi visant à poser des "limites" à la surveillance des données téléphoniques, tout en "préservant" ce programme de la NSA. Le président Barack Obama, qui avait souhaité ce débat, avait assuré dans le même temps que ce programme était légal.

http://www.lemonde.fr/ameriques/article/2013/10/16/la-nsa-a-largement-exagere-le-nombre-d-attentats-qu-elle-aurait-dejoue_3496345_3222.html
Revenir en haut Aller en bas
annabi
Général de coprs d'armée فريق (ANP)
Général de coprs d'armée فريق  (ANP)


messages : 6940
Inscrit le : 18/07/2012
Localisation : paris
Nationalité : Algerie-Francais
Médailles de mérite :

MessageSujet: Re: Renseignement & Espionnage   Dim 20 Oct 2013 - 22:30

Citation :
La guerre secrète du Mossad contre les armes de destruction massive en Syrie

«Les Israéliens sont les yeux et les oreilles, parfois exclusivement, parfois de façon complémentaire, selon ce que le renseignement américain est capable, ou incapable, de récolter lui-même.» Un ancien chef du renseignement militaire israélien.

Le 20 août 2012, Barack Obama déclarait que toute utilisation ou transfert de ses armes chimiques par Bachar el-Assad équivaudrait, selon les Etats-Unis, à franchir une ligne rouge. L’idée étant que cela entraînerait une intervention américaine en Syrie. Dans l’esprit de certains responsables, au ministère des Affaires étrangères israélien, si Obama avait tracé cette ligne, c’est qu’il imaginait qu’elle ne serait jamais franchie. Et s’il avait émis cette hypothèse, c’était en partie grâce aux évaluations transmises par les services de renseignements israéliens, qui mènent depuis plusieurs décennies une campagne clandestine destinée à priver Assad de ses armes les plus meurtrières –et apparaissent comme les principaux partenaires des Etats-Unis dans la collecte d’informations sur aux régimes moyen-orientaux.

Selon deux anciens hauts responsables du renseignement militaire avec qui je me suis entretenu, les agences de renseignement israéliennes considéraient à l’époque qu’Assad n’utiliserait pas d’armes de destruction massive (ADM) et qu’il conserverait son arsenal d’armes chimiques comme atout dans sa manche lors d’une éventuelle une négociation en vue d’obtenir l’asile politique pour lui, sa femme et ses proches. Israël se trompait.
Le 10 mars 2013, les renseignements israéliens apprennent de leurs sources l’utilisation d’armes chimiques par le régime syrien. L’information est confirmée par recoupement, notamment par des interceptions des fréquences radio de l’armée syrienne, et le repérage par les satellites de surveillance de mouvements autour d’un bunker dont on sait qu’il abrite un dépôt d’armes chimiques.
Israël partage ses informations avec les Etats-Unis, mais Washington se refuse à admettre leur véracité. Pour les Israéliens, il est clair que les Américains y voient une patate chaude dont le président n’est pas d’humeur à se saisir. Sans bien saisir les importantes répercussions politiques de la divulgation de ces informations (à moins que ce ne fût à dessein, pour faire pression sur Washington), le général de brigade Itai Brun, chef de l’Aman, le département de recherche du renseignement militaire israélien, lors d’un discours prononcé le 23 avril à Tel-Aviv devant l’Institut pour les recherches sur la sécurité nationale, déclare sans équivoque que le gouvernement syrien a fait usage d’armes chimiques contre sa population.
Des paroles qui ont irrité et embarrassé l’administration américaine.
Pendant quelques jours, Washington bredouille et exige des clarifications d’Israël. Au bout du compte, suivant un rapport soumis aux Nations unies par le Royaume-Uni et la France, l’administration Obama doit reconnaître que l’information est en fait exacte. Depuis, pour éviter ce genre d’incidents, les officiers de l’Aman sont interdits de conférences en public.

http://lecolonel.net/la-guerre-secrete-du-mossad-contre-les-armes-de-destruction-massive-en-syrie/
Revenir en haut Aller en bas
Contenu sponsorisé




MessageSujet: Re: Renseignement & Espionnage   Aujourd'hui à 16:55

Revenir en haut Aller en bas
 
Renseignement & Espionnage
Voir le sujet précédent Voir le sujet suivant Revenir en haut 
Page 1 sur 7Aller à la page : 1, 2, 3, 4, 5, 6, 7  Suivant
 Sujets similaires
-
» renseignement poussette
» Renseignement sur métiers divers
» fiche des renseignement
» besoin de renseignement
» Help, renseignement sur Maclaren!

Permission de ce forum:Vous ne pouvez pas répondre aux sujets dans ce forum
Royal Moroccan Armed Forces :: Diversités :: Informations Internationales-
Sauter vers: