Tuesday, June 26, 2018

Chinese Spymasters

.
Chinese Spymasters - The New Warlords? - WW2 - Spies & Ties > .

China Initiative - Countering CCP's IP Theft

22-3-24 Controversy behind the China initiative, explained 1 | China in Focus > .
22-9-6 Xina steals military technology; copies Russian weapons - Lei > .
22-2-24 Assistant AG Matthew Olsen on Countering Nation-State Threats > .
22-1-14 Twists and Turns of the DOJ’s China Initiative - Diego > .

China Initiative - Countering CCP's IP Theft ..
TTP - Thousand Talents Scam ..

The China Initiative was launched by the United States Department of Justice, the FBI, and other United States federal agencies in November 2018. It is led by the United States Department of Justice National Security Division, and has been described as a "sweeping effort" to counter Chinese espionage in American businesses and research by eliminating spies and halting the transfer of information and technology to China. In addition, the China Initiative focuses on safeguarding "critical infrastructure against external threats through foreign direct investment and supply chain compromises, as well as combatting covert efforts to influence the American public and policymakers without proper transparency." There is no definition of what a China Initiative case is. It has been criticized as being ineffective, racially biased, and disproportionate. Some of the cases under the initiative were based on false evidence by the FBI. The China Initiative's end was announced on 23 February 2022, citing perceptions of unfair treatment of Chinese Americans and residents of Chinese origin.

On 23 February 2022, the DOJ announced that it was ending the China Initiative, largely due to "perceptions that it unfairly painted Chinese Americans and U.S. residents of Chinese origin as disloyal." Assistant Attorney General for National Security Matthew Olsen stated that the decision was not the abandonment of law enforcement response to the threat posed by China but a reframing and recalibration. According to Olsen, the DOJ will continue to combat threats posed by the Chinese government. China Initiative cases typically involved lying or omitting information on disclosure forms. Some cases resulted in convictions such as with Charles Lieber, who was found guilty of making false statements to federal officials and filing false tax returns. However other cases have been reined in or abandoned, such as with Gang Chen, or defeated in trial in the case of Anming Hu. A review of existing cases was conducted and the DOJ is "comfortable with where those cases are."

CIA's Acoustic Kitty Cold War Plan

.
Acoustic Kitty: The CIA's Plan to Spy... with Cats >skip ad to Early Training > .

Sunday, June 24, 2018

Espionage

Bletchley & Intelligence - tb >> .

Espionage Act - USA ..

GCHQ & Bletchley: Code-breaking hub Bletchley Park's contribution to World War Two is often over-rated by the public, an official history of UK spy agency GCHQ says. Bletchley still played an important role, and GCHQ had a significant influence in other conflicts.

GCHQ, known as Britain's listening post, was set up on 1 November 1919 as a peacetime "cryptanalytic" unit. During WW2, staff were moved to Bletchley Park, Buckinghamshire, to decrypt Nazi Germany's messages including, most famously of all, the Enigma communications. This provided an inside view of Nazi orders and movements.

The work was kept secret for decades but an official history of British intelligence in the war would later say it had shortened the conflict by two to four years and without it the outcome would have been uncertain.


The machine was an early attempt to automate code-cracking and, due to its complexity, was named after the illustrator W Heath Robinson.

The World War Two codebreaking machine, which went into operation at Bletchley Park in June 1943, is acknowledged as the inspiration for Colossus, the world's first programmable computer.

The Colossus, the world's first programmable computer, was designed off the back of work to try to improve the Heath Robinson.

Even after the launch of Colossus in 1944, the Heath Robinson continued to develop and was used in tackling messages sent between Hitler and the German High Command.

At the end of World War Two there were two "super Robinsons" in use and another two under development. The machine was operational until the 1950s.


The Colossus, the world's first programmable computer, was designed by a team led by Tommy Flowers at the General Post Office in London in late 1943.

It was programmed to run algorithms used to decipher messages sent among German High Command, who had encrypted them using their Lorenz cipher system.

After moving Colossus to Bletchley, in rural Buckinghamshire, the first Lorenz message was cracked on 5 February 1944, reducing the time it took to break the cipher from weeks to hours.

Bletchley Park was the wartime home of the Government Code & Cypher School which broke the German Enigma and Lorenz codes

The mansion dates from the 19th Century but the intelligence centre was rapidly assembled with mainly wooden structures in 1939 where mathematicians including Alan Turing and Bill Tutte worked.

After the war, two of the 10 Colossus machines ended up at the government's new GCHQ in Cheltenham, Gloucestershire. The other eight were dismantled.

Saturday, June 23, 2018

Fifth Column


0:14 (Infiltrate state bureaucracy)
2:23 Induce state agencies to attack society
   3:02 Identify, then undermine, prominent individuals (progressors)
7:17 Encourage spy-mania, "fifth columnist" paranoia, conspiracy theories
8:47 Hobble bureaucracies through red tape and paperwork
10:51 Encourage moral decay, undermine trust, encourage anti-patriotic nationalist activism
12:18 Entangle the enemy in a resource-draining proxy war

A fifth column is any group of people who undermine a larger group from within, usually in favor of an enemy group or nation. According to Harris Mylonas and Scott Radnitz, "fifth columns" are “domestic actors who work to undermine the national interest, in cooperation with external rivals of the state." The activities of a fifth column can be overt or clandestine. Forces gathered in secret can mobilize openly to assist an external attack. This term is also extended to organised actions by military personnel. Clandestine fifth column activities can involve acts of sabotage, disinformation, or espionage executed within defense lines by secret sympathizers with an external force.

Fifth Column was the name MI5, the British Security Service, gave to a WW2 operation run from 1942 until at least 1947. It was initially intended to identify people who would be willing to assist Germany in the event of an invasion of the United Kingdom, but as it developed, it also acted to divert its targets away from harmful activities. Although it ended up providing information on more than 500 suspects, it was the source of conflict within MI5, and after the war ended it remained secret, with none of the targets ever aware that they had been its subject. It was revealed in a release of files to the National Archives in 2014.

The operation was run by the counter-sabotage section of MI5, designation B1c. The head of this small section was Victor Rothschild, who had joined MI5 in 1940 to do scientific liaison. He was assisted by Theresa Clay, an entomologist whom he'd recruited. The agent at the heart of the operation was Eric Roberts, a former bank clerk who had been working undercover for MI5 inside the British Union of Fascists since 1934.

"British intelligence officers mounted a covert operation to infiltrate and control hundreds of Nazi sympathisers in the UK during the second world war, according to newly declassified MI5 files. In the most significant indication so far of a “fifth column” of Hitler sympathisers in Britain, an MI5 mole known by his code name “Jack King” posed as a Gestapo agent to penetrate groups of fascists. They passed him information, believing that it was being channelled to Germany, and were rewarded with fake Nazi war medals distributed by their British masters. MI5 has not disclosed King’s real identity."

........... 

"The Second World War and the ‘fifth column’ scare of spring 1940 led to the enhancement of MI5's role after internal reorganization, following the near collapse of MI5 during the crisis; the supposed existence of the fifth column became a means by which MI5 came to justify its existence, growth, and importance. However, internment of aliens and fascists, and the proscription of the British Union of Fascists in July 1940 destroyed the non-existent threat of a Nazi-manipulated British fifth column. Political surveillance of other groups who opposed the war, most notably Jehovah's Witnesses and the Communist Party of Great Britain (CPGB), provided the new justification for vigilance. Even after the CPGB adopted super-patriotism after the Nazi invasion of the Soviet Union, MI5's simplistic interpretation of its ‘revolutionary defeatism’ remained unaltered. The deterioration in relations between the victorious allies and the coming of the Cold War enabled MI5 to justify its importance and to avoid the severity of the cuts that had threatened its existence after the First World War." 
Evolution of the Mythical British Fifth Column, 1939-46* .

Alien infiltration .
Black propaganda .
Copperhead (politics) .
Demographic threat .

sī vīs pācem, parā bellum

igitur quī dēsīderat pācem praeparet bellum    therefore, he who desires peace, let him prepare for war sī vīs pācem, parā bellum if you wan...