SPECIAL REPORT ESPIONAGE November 12Th 2016 Shaken and Stirred

Total Page:16

File Type:pdf, Size:1020Kb

SPECIAL REPORT ESPIONAGE November 12Th 2016 Shaken and Stirred SPECIAL REPORT ESPIONAGE November 12th 2016 Shaken and stirred 20161012_SR_ESPIONAGE_001.indd 1 27/10/2016 13:41 SPECIAL REPORT ESPIONAGE Shaken and stirred Intelligence services on both sides of the Atlantic have struggled to come to terms with new technology and a new mission. They are not done yet, writes Edward Carr IN THE SPRING thaw of 1992 a KGB archivist called Vasili Mitrokhin CONTENTS walked into the British embassy in Riga. Stashed at the bottom ofhis bag, beneath some sausages, were copies of Soviet intelligence files that he 5 Technology had smuggled out of Russia. Before the year was out MI6, Britain’s for- Tinker, tailor, hacker, spy eign-intelligence service, had spirited away Mitrokhin, his family and six large cases packed with KGB records which he had kept hidden in a milk 7 Governance Standard operating churn and some old trunks under the floor ofhis dacha. procedure The pages of “The Mitrokhin Archive”, eventually published in 1999, are steeped in vodka and betrayal. They tell the stories of notorious 8 Edward Snowden spies like Kim Philby, a British intelligence officer who defected to Russia You’re US government in 1963. And they exposed agents like Melita Norwood, who had quietly property worked for the KGB for 40 years from her home in south-east London, then shot to fame as a great-gran- 10 China and Russia Happenstance and enemy ny. Her unrelenting Marxist refus- action al to shop at Britain’s capitalist su- permarkets earned her the 12 How to do better headline: “The Spy Who Came in The solace of the law from the Co-op”. Mitrokhin’s record for the largest-ever haul of intelligence was smashed in 2013 when an American contractor, Edward Snowden, fled from Hawaii to Hong Kong with a secret archive of his own that contained more than 1.5m classified files from America’s National Security Agency (NSA). Mr Snowden un- covered programmes with names like DISHFIRE and OPTIC NERVE under which the NSA and its British counterpart, GCHQ, were alleged to be monitoring phones and computers around the world. Mr Snowden’s accusa- tion was not that foreign agents had infiltrated Western intelligence agencies but that Western agencies were spying on ordinary people, including their own citizens. To look at Mitrokhin’s meticulous typed-up transcriptions side by side with Mr Snowden’s capacious pen-drives conveys a sense of how deeply and rapidly the business of intelligence has changed. Western in- telligence agenciesused to inhabita parallel world where spy battled spy. Their trade was stealing or guarding secrets. Their masters were the men and women in government. Today the intelligence services are part of everyone’s world. Their main taskhas been to protect society from terro- ristsand criminals. Theyare increasinglyheld to accountin the press, par- liaments and courts. This special report is about their struggle in the past 15 years to come to terms with this transition. They are not done yet. ACKNOWLEDGMENTS Many of the people who helped with Who can spy on the spies? this special report prefer to remain The intelligence revolution ispartlythe resultofnewtechnology. As anonymous, for understandable recently as1999, on becoming director ofthe NSA, Michael Hayden asked reasons. As well as acknowledging them, the author would like to single to send an e-mail to all staff. He was told: “We can’t actually do that.” The out three people: Jeffrey Hiday, Oleg organisation used computers to break codes rather than to surf the web A list of sources is at Kalugin and Nigel Inkster. as everyone else did. The NSA’s new facility in Bluffdale, Utah, the first of 1 Economist.com/specialreports The Economist November 12th 2016 1 SPECIAL REPORT ESPIONAGE 2 several, now stores exabytes of data drawn from everyday com- munications. At Britain’s GCHQ, most code-breaking was done on paper until well into the 1980s. Today, inside its doughnut- shaped building in Cheltenham, south-west England, the hum from banks of computers that stretch away into the half-light is drowned out by the roar ofair-conditioning. The revolution has brought spying closer to ordinary peo- ple. After the attacks on America on September 11th 2001, coun- ter-terrorism and counter-insurgency became the focus for the American intelligence agencies, says John Parachini, who heads intelligence policy for RAND, a think-tank. Almost two-thirds of today’s intelligence personnel have been hired since 9/11. As the world hasmoved online, so the spookshave become involved in monitoring organised crime and paedophiles as well as terro- rists. That might mean tracking a drugs syndicate from Latin America to Europe, or working out how criminal gangs launder their money, or following paedophiles on the web. In Mitrokhin’s days spies sent coded messages using short- wave radios and dead letter boxes. Now the communications of precondition for intimacy, trust and individuality, says David the spooks’ new targets are mixed in with everyone else’s, shut- Anderson, a seniorlawyerasked by the British government to re- tling between computers and smartphones that are identical to viewintelligence legislation. Itsecuresrightssuch as the freedom those on yourdeskand in yourpocket. Counter-terrorism, in par- ofassemblyand fairtrials. The knowledge thatan all-seeing state ticular, is pre-emptive. Hence the security services have had to is watching has a chilling effect even if you have done nothing act as hunters ofconspiracies rather than gatherers of evidence. wrong. Perhaps your words will be used against you later, under laws passed by a different government. Perhaps the state will try I don’t believe you any more to crush the dissent that prefigures desirable social change—as And the revolution is taking place amid growing popular America’s FBI tried to destroy Martin Luther King by sending a suspicion of everyone in charge. The days are gone when the letter, supposedlyfrom a disillusioned admirer, thataccused him word of Congress, the home secretary and the odd judge com- ofbeing a “colossal fraud and an evil, vicious one at that”. manded enough public confidence to see offthe accusations ofa But privacy is not an unalloyed good. A society that gives it private individual such as Mr Snowden. Belated official ac- primacy over security invites paralysing disorder and injustice knowledgment of secret programmes has often been met by that would inhibit the very intimacy and freedom of expression public dismay, even after assurances that they have been proper- which privacy is supposed to promote. ly overseen. “It is not enough for the authorities just to say ‘trust Likewise, although the public needs to know what is being us’,” writes Paul Bernal, of Britain’s University of East Anglia. done in its name, some spying techniques lose their potency if “The public needs to know.” they are discovered. Early Enigma decrypts in 1940 from Bletch- Privacy advocates complain that the spooks have unprece- ley Park, Britain’s code-breaking centre, were given the “CX” pre- dented scope to pry into people’s lives. They warn of a burgeon- fix of MI6 reports so that the Nazis would think they were based ing surveillance state. The spooks retort that, on the contrary, on standard human intelligence (known in the jargon as HU- they cannot keep up with terrorists and criminals cloaked by en- MINT). A former CIA employee who is now at RAND tells how, cryption, the dark web and the fact that, as the world builds in- after a successful raid in 1998, journalists learned that the NSA ternet infrastructure, a smaller share of total traffic is routed was interceptingcalls from the satellite phone ofOsama bin Lad- through accessible Western networks. en, the founder ofal-Qaeda. Immediately after the news got out, At the heart of the debate lies a conflict. The goal of a mod- the phone fell silent. ern intelligence service, in the formulation of Sir David Omand, Since the Snowden revelations, Western security services, a former British intelligence chief, is for citizens to trust the state and particularly those of America and Britain, have come in for to manage the threats to their everyday lives. To maintain public savage criticism. Much of this has focused on the intense years safety, the intelligence services must be able to employ secret immediately after 9/11. The CIA subjected prisoners to brutal in- ¤ ¡¢ sources and methods that inevitably involve intrus £et to terrogation techniques, including simulated drowning, or water- command that public trust, they must also be transparent and boarding. For some years the NSA operated a telephone-surveil- prepared to live by rules that protect individual privacy. lance programme without judicial oversight. That programme These contradictions cannot be wished away. Privacy is a was later judged to be illegal. This special report will lookat those transgressions in great- ¦ ¤ £ er det ¥et, even taking them into account, the criticism of American and British intelligence is overblown. Rather than be- ing James Bonds, real-life intelligence officers are bureaucrats. Rather than acting as freewheeling individualists, most set out to live by the rules. It is possible to argue about the merits of inter- cepting and warehousing data, about access to databases and large-scale hacking, but the idea that controlling masterminds at the NSA and GCHQ are plotting mass surveillance is a myth. Such criticism is especially unfair when it comes from out- side the English-speakingintelligence alliance embracing Ameri- ca, Australia, Britain, Canada and New Zealand, known as the Five Eyes. Few countries say much about their intelligence ser- 1 2 The Economist November 12th 2016 SPECIAL REPORT ESPIONAGE 2 vices or have a clear frameworkforgoverning them. Britain’s op- of the infrastructure of the internet, and much of the rest passed erated almost entirely in the shadows until the 1990s and ac- through Britain, even if it originated and terminated elsewhere.
Recommended publications
  • The Church Committee, the CIA, and the Intelligence Dimension of US
    13 Unquiet Americans: The Church Committee, the CIA, and the Intelligence Dimension of U.S. Public Diplomacy in the 1970s Paul M. McGarr On September 13, 1974, William E. Colby, the Director of U.S Central Intelligence, stood before the annual conference of the Fund for Peace, a Washington D.C. based non- profit institution, concerned with security and development in the global south. Speaking in the context of a post-Watergate political climate heavily laden with conspiracism and suspicion, Colby surprised his audience by making a case for greater “openness” and transparency on the part of the Central Intelligence Agency. Alluding to CIA-led interventions stretching back to the late 1940s, that had sought to effect regime change in Italy, Iran, Guatemala, Indonesia, the Congo, and Cuba, amongst others, Colby acknowledged the Agency’s record in, “assist[ing] America’s friends against her adversaries in their contest for control of a foreign nation’s political direction.” Remarkably, America’s spymaster went on to publicly defend the utility of CIA interference in the internal affairs of independent sovereign states. “I . would think it mistaken to deprive our nation of the possibility of some moderate covert action response to a foreign problem,” Colby volunteered, “and leave us with nothing between a diplomatic protest and sending in the Marines.”1 In India, where the CIA had been under a media microscope since 1967, when the American magazine Ramparts exposed the Agency’s longstanding financial relationships with an international network of anti- communist educational and cultural bodies, Colby’s candor, in the words of U.S.
    [Show full text]
  • The Mitrokhin Archive Reveals the STASI Usage of Number Stations
    The Mitrokhin Archive reveals the STASI usage of number stations Major Vasili Mitrokhin (1922- 2004) was a senior KGB archivist. He began his carrier in the Soviet secret service from 1948. He started as overseas undercover operative, but later was moved to archives of the KGB's First Chief Directorate. It was responsible for foreign operations and intelligence collection activities by the training and management of the covert agents, intelligence collection management, and the collection of political, scientific and technical intelligence. As archivist he gained access to many secret and sensitive documents. He became disillusioned with the Soviet system by listening western radio broadcasts and reading the documents about the Soviet repressions and atrocities. He managed to make copies and detailed notes of the documents from the archive, while he supervised the archive move from Lubyanka building to the new KGB headquarters at Yasenevo. In 1985 he retired. After the collapse of the Soviet Union he traveled to Riga, Latvia and tried to make contact with the US embassy. He was however, turned down by the Americans who did not trust the authenticity of his documents. The UK embassy was more helpful and Mitrokhin gained appointment with the British Secret Service the MI6 and the 25,000 pages of files hidden in his house, covering operations from as far back as the 1930s. The content of these notes and documents have been described in various books, but now his archive has been made digital in the Churchill Archives Center. Among the published documents one document caught our attention, the STASI German/Russian lexicon of intelligence terms.
    [Show full text]
  • The Soviet Roots of Meddling in U.S. Politics
    The Soviet Roots of Meddling in U.S. Politics PONARS Eurasia Policy Memo No. 452 January 2017 Mark Kramer1 Harvard University The release on January 6 of an unclassified version of the U.S. Intelligence Community’s report describing efforts by Russian security services to influence last year’s U.S. presidential campaign in favor of Donald Trump evoked a sense of deja vu. Despite the advent of cyberwarfare, the Russian government’s attempts to sway the U.S. election in 2016 were strikingly reminiscent of Soviet “active measures” during the Cold War. The Intelligence Community report says that Russia’s use of cyberwarfare and other tactics in 2016 was “the most recent expression of Moscow’s longstanding desire to undermine the US-led liberal democratic order.” This is undoubtedly true, but the report goes on to claim that “these activities demonstrated a significant escalation in directness, level of activity, and scope of effort compared to previous operations.” This sweeping characterization is toned down later in the report, but only slightly. The notion that Russian intelligence services’ actions in 2016 were unprecedented in scale reflects an inadequate understanding of the historical context. The reality is that the two main Soviet intelligence and security agencies—the KGB and GRU (military intelligence)—kept up a vigorous campaign for several decades to meddle in U.S. politics and discredit the United States. The “active measures” used by the KGB and GRU during the Cold War, including disinformation, forgeries of documents and letters, and the spread of propaganda through sympathetic individuals and front organizations, were remarkably similar to the tactics and goals of Russian intelligence agencies in 2016.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • Membership Lists, Metadata, and Freedom of Association's Specificity Requirement
    Membership Lists, Metadata, and Freedom of Association's Specificity Requirement KATHERINE J. STRANDBURG* Over the past year, documents revealed by leaker Edward Snowden and declassified by the government have provided a detailed look at some aspects of the National Security Agency's (NSA's) surveillance of electronic communications and transactions. Attention has focused on the NSA's mass collection from major telecommunications carriers of so-called "telephony metadata," which includes dialing and dialed numbers, call time, duration, and the like.' The goal of comprehensive metadata collection is what I have elsewhere called "relational surveillance"2-to follow "chains of communications" between "telephone numbers associated with known or suspected terrorists and other telephone numbers" and then to "analyze those connections in a way that can help identify terrorist * Alfred B. Engelberg Professor of Law, New York University School of Law. Professor Strandburg acknowledges the generous support of the Filomen D'Agostino and Max E. Greenberg Research Fund. 1 The term "metadata" has been widely adopted in discussing the NSA's data collection activities and so I will use it here. When one moves beyond call traffic data, however, the term's meaning in the data surveillance context is problematic, ill-defined and may obscure the need for careful analysis. As one illustration of these issues, consider NSA documents recently made public in connection with news reports of NSA monitoring of text messages, which refer, in language that would have made the Red Queen proud, to "content derived metadata." See James Ball, NSA DishfirePresentation on Text Message Collection-Key Extracts, THE GUARDIAN, Jan.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • Researching Soviet/Russian Intelligence in America: Bibliography (Last Updated: October 2018)
    Know Your FSB From Your KGB: Researching Soviet/Russian Intelligence in America: Bibliography (Last updated: October 2018) 1. Federal Government Sources A. The 2016 US Presidential Election Assessing Russian Activities and Intentions in Recent US Elections. Office of the Director of National intelligence, January 6, 2017. Committee Findings on the 2017 Intelligence Community Assessment. Senate Select Committee on Intelligence, July 3, 2018. Disinformation: Panel I, Panel II. A Primer in Russian Active Measures and Influence Campaigns: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Thursday, March 30, 2017. (Y 4.IN 8/19: S.HRG.115-40/) Link: http://purl.fdlp.gov/GPO/gpo86393 FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment. White House Office of the Press Secretary, December 29, 2016. Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election. Department of Justice Office of Public Affairs, July 13, 2018. Grizzly Steppe: Russian Malicious Cyber Activity. U.S. Department of Homeland Security, and Federal Bureau of Investigation, December 29, 2016. Information Warfare: Issues for Congress. Congressional Research Service, March 5, 2018. Minority Views: The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018, Submit the Following Minority Views to the Majority-Produced "Report on Russian active Measures, March 22, 2018." House Permanent Select Committee on Intelligence, March 26, 2018. Open Hearing: Social Media Influence in the 2016 U.S. Election: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Wednesday, November 1, 2017.
    [Show full text]
  • Secrecy and Human Capital Management in US NSA and Israel Unit 8200
    LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats.
    [Show full text]
  • Covert Networks a Comparative Study Of
    COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns.
    [Show full text]
  • We Only Spy on Foreigners": the Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance
    Chicago Journal of International Law Volume 18 Number 2 Article 3 1-1-2018 "We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Follow this and additional works at: https://chicagounbound.uchicago.edu/cjil Recommended Citation Lubin, Asaf (2018) ""We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance," Chicago Journal of International Law: Vol. 18: No. 2, Article 3. Available at: https://chicagounbound.uchicago.edu/cjil/vol18/iss2/3 This Article is brought to you for free and open access by Chicago Unbound. It has been accepted for inclusion in Chicago Journal of International Law by an authorized editor of Chicago Unbound. For more information, please contact [email protected]. “We Only Spy on Foreigners”: The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Abstract The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go beyond their limited territorial jurisdiction and sweep in “the telephone, internet, and location records of whole populations.” Today’s political leaders and corporate elites are increasingly engaged in these kinds of programs of bulk interception, collection, mining, analysis, dissemination, and exploitation of foreign communications data that are easily susceptible to gross abuse and impropriety.
    [Show full text]