Covert operations

From Gender and Tech Resources

Revision as of 08:18, 30 May 2015 by Lilith2 (Talk | contribs) (Created page with "Many events in history have been changed because of covert missions by military or by secret organisations led by a government. <em>“History isn’t like that. History unr...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Many events in history have been changed because of covert missions by military or by secret organisations led by a government.

“History isn’t like that. History unravels gently, like an old sweater. It has been patched and darned many times, reknitted to suit different people, shoved in a box under the sink of censorship to be cut up for the dusters of propaganda, yet it always – eventually – manages to spring back into its old familar shape. History has a habit of changing the people who think they are changing it. History always has a few tricks up its frayed sleeve. It’s been around a long time.” ~ Terry Pratchett, Mort

Discoveries and experiences are being shared, conspiracies disclosed [1], injustices revealed, the dead named, and sometimes governments change as a result of that. More likely, when a government changes it is caused by covert operations.

Alphabet soup

Signals Intelligence (SIGINT)

Intelligence-gathering by interception of signals, between people (COMINT) or from electronic signals not directly used in communication (ELINT). The NSA SIGINT Strategy 2012-2016 covers all the comsec and crypto initiatives to covertly exploit people, cryptographers, anonymisers, informants, planted spies, security firms, networks, governments, nations [2].

Communications Intelligence (COMINT)

Covers all electronic communications in the US and the world "to ensure national security". The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the 60s. Technology is developed and implemented in secret.

Electronic Intelligence (ELINT)

ELINT is divided into Technical ELINT (TechELINT) and Operational ELINT (OpELINT):

  • Technical ELINT obtains signal structure, emission characteristics, modes of operation, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals for determining its capabilities and role in a larger system as part of electronic warfare.
  • Operational ELINT focuses on locating specific ELINT targets and determining operational patterns of the systems named Electronic Order of Battle (EOB) for supporting military operational planners and tactical military commanders on the battlefield.

And it's "counter" programs, existing and under development (afaik):

  • Electronic counter-countermeasures (ECCM) in the US and electronic protective measures (EPM) in Europe
  • Wild Weasel (alias Iron Hand or SEAD)
  • Smart Dust
  • Wolfpack

Foreign Instrumentation Signals Intelligence (FISINT)

TELINT (Telemetry Intelligence), later named FISINT (Foreign Instrumentation Signals Intelligence) used for intercepting, processing, and analysis of foreign telemetry is closely related to TechELINT and conducted by DoD.

Human intelligence (HUMINT)

Any information that can be gathered from any human sources. The National Clandestine Service (NCS) is the branch of the CIA responsible for the collection of HUMINT.

Domestic Intelligence (DOMINT)

The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network seems hidden from the public, save for the leaks.

Communications Privacy Folly

In reply to a request for comments on Mexico law revisions – Warrantless Real-time Cell phone Geolocation Data Surveillance, Cryptome comments - This is the short version of why there can be no solution to preventing communication systems abuse [3].

Countermoves

I don’t think any alternative will be possible until certain realities are faced, not just by fringe figures like ourselves but by much broader swathes of society, and that seems unlikely [4].

News and watchdogs

Books

Documentaries

Counterintelligence

References

  1. 25 Most Top Secret Military Operations In History https://www.youtube.com/watch?v=_dWiRtkzaAQ
  2. NSA Global SIGINT Power to Generate Profits and Pay http://cryptome.org/2013/11/nsa-power-profit-pay.htm
  3. Communications Privacy Folly http://cryptome.org/2012/06/comms-folly.htm
  4. The Californian Reality http://nettime.org/Lists-Archives/nettime-l-1401/msg00064.html