Showing posts with label intelligence. Show all posts
Showing posts with label intelligence. Show all posts

Monday, April 8, 2024

UKUSA Agreement - FVEY

23-10-17 “Five Eyes” summit: Top intelligence chiefs on innovation threats - Global > .
23-4-13 Intelligence = Information + Analysis; P00 & Pentagon Leaks | DiD > .
Pine Gap (JDFPG) - Armor >> .

◊ Indo-Pacific ..

Born out of the Cold War, Five Eyes is a multinational spy network comprised of Canada, Australia, New Zealand, Great Britain, and the United States. The member states of Five Eyes gather intelligence about foreign countries, sharing it freely between themselves.

The United Kingdom – United States of America Agreement (UKUSA) is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intelligence operations is also known as the Five Eyes. In classification markings this is abbreviated as FVEY, with the individual countries being abbreviated as AUS, CAN, NZL, GBR, and USA, respectively.

Emerging from an informal agreement related to the 1941 Atlantic Charter, the secret treaty was renewed with the passage of the 1943 BRUSA Agreement, before being officially enacted on 5 March 1946 by the United Kingdom and the United States. In the following years, it was extended to encompass Canada, Australia, and New Zealand. Other countries, known as "third parties", such as West Germany, the Philippines, and several Nordic countries, also joined the UKUSA community in associate capacities, although they are not part of mechanism for automatic sharing of intelligence that exists between the Five Eyes.

Much of the sharing of information is performed via the ultra-sensitive STONEGHOST network, which has been claimed to contain "some of the Western world's most closely guarded secrets". Besides laying down rules for intelligence sharing, the agreement formalized and cemented the "Special Relationship" between the UK and the US.

Due to its status as a secret treaty, its existence was not known to the Prime Minister of Australia until 1973, and it was not disclosed to the public until 2005. On 25 June 2010, for the first time in history, the full text of the agreement was publicly released by the United Kingdom and the United States, and can now be viewed online. Shortly after its release, the seven-page UKUSA Agreement was recognized by Time magazine as one of the Cold War's most important documents, with immense historical significance.

The global surveillance disclosure by Edward Snowden has shown that the intelligence-sharing activities between the First World allies of the Cold War are rapidly shifting into the digital realm of the Internet.


The documents, including diary entries, detail the war time meetings that began at Bletchley Park and led to the UKUSA deal being signed in March 1946. The alliance involved working together to intercept communications and break codes, sharing almost everything.

A short entry from February 1941 in the diary of Alastair Denniston, released for the first time today by GCHQ, marked the beginning of what was once the most secret of relationships. Denniston was head of Bletchley Park and he was welcoming a group of American code breakers at a time when the US had not yet entered WW2.

"The Ys are coming!" the entry read - meaning the Yanks. The Americans had undertaken a perilous crossing with their boat shot at by Nazi planes but they arrived at the home of British code breakers on a mission of huge importance.

With the permission of then-Prime Minister Winston Churchill, the two groups of spies would share their most sensitive secrets - that the UK had broken the German Enigma code and the US the Japanese code called Purple. 

Further diary entries reveal how key figures would travel back and forth over the Atlantic, including Denniston to meet with his opposite number as well as code breaker Alan Turing.

The power of the alliance in WW2 has made it the heart of what is sometimes called the "special relationship" between the two countries. The term seems increasingly outdated but the one place where it has always been real is when it comes to code breaking.

The relationship forged in that visit would outlast WW2 and, after a series of meetings, be formalised at the start of the Cold War with a document signed in Washington on 5 March 1946. The agreement was something of a "marriage contract" - each agreed honesty, openness and commitment to the other including a "no spy agreement" in which they would not target the other side. They would share nearly all the intelligence they produced through breaking codes and intercepting communications (known as signals intelligence or SIGINT) although the agreement did allow some wiggle room if one side felt they had to act independently.

Initially known as UKUSA, over the next 10 years it would be expanded as Australia, Canada and New Zealand joined, making up what is known today as the Five Eyes alliance. 



23-5-25 Xina-backed hackers ‘living off the land’ to target critical systems, says Five Eyes group: Targets include US military facilities on Guam that would be key in an Asia-Pacific conflict, say Microsoft and western spy agencies. ... The US and western security agencies warned in their advisory that the activities involved “living off the land” tactics, which take advantage of built-in network tools to blend in with normal Windows systems. The advisory warned that the hacking could then incorporate legitimate system administration commands that appear “benign”. While Xinese hackers are known to spy on western countries, this is one of the largest known cyber-espionage campaigns against American critical infrastructure.

US Intelligence Agencies

.
14-6-7 America's intelligence community - WaPo > .
CIA Spies - Declassified >> .
CIA, MI6, FVEY, XX - Intelligence, Espionage, Cyber - Guy Lewis >> .


The United States Intelligence Community (IC) is a group of separate U.S. federal government intelligence agencies and subordinate organizations that work both separately and collectively to conduct intelligence activities which support the foreign policy and national security interests of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments.

The IC is overseen by the Office of the Director of National Intelligence (ODNI), which is headed by the director of national intelligence (DNI) who reports directly to the president of the United States.


Wednesday, March 27, 2024

British Army - Digital Transformation

21-5-12 Digital Transformation: How Can The Army Adapt For Future Warfare? > .
24-2-19 AI Played Wargames - Result Not Reassuring - Sabine > .
24-2-6 Exclusive: Head of UK Strategic Command's full in-depth interview - Forces > .
24-2-1 Could National Service fix British forces recruitment crisis? | Sitrep > .
23-9-11 British Armymost lethal army in Europe by 2030 - CGS - Forces > .
23-7-19 Cyber & Technologies in Defence Command Paper - Forces > .
23-7-18 Futureproofing for changing threats; Defence Command Paper - Forces > .
22-9-29 Is Your Laptop's Microphone Spying On You? - Seytonic > .
22-9-29 Pegasus: The Most Dangerous Virus In The World - Tech > .

Thursday, April 6, 2023

Incontinent Security

23-6-16 ‘So many red flags’ | Narcissistic SDO* leaker Jack Teixeira > .
23-4-20 [Dumbass Deviant] Under Investigation by FBI, DOJ, NCIS - Jake > .
23-4-20 [Dumbass Deviant] vs Sarah Bils 'Murican Accent - Jake > .
23-4-19 Pentagon Docs LEAK! What do alleged leaked documents reveal? - U24 > .
23-4-16 Lax Security for Tw*ts | Every Orc Lives in Fear - Jake > .
23-4-14 Jack Teixeira in court, charged over Pentagon leaks - BBC > .
23-4-14 [Narcissism and immaturity of treasonous wrong-wing gamer] - Times > .
23-4-10 Leak Debate: Ukraine's Offensive Plans Real? - Matters > .

"For weeks, allegedly classified documents from various parts of the US government concerning the Russian war on Ukraine have been circulating on the internet. The "New York Times" was the first of now many media to report on these leaks—without publishing the documents themselves. Copies of these can still be found quite easily, for example on pro-Russian telegram channels. But beware, there are also obvious fake and manipulated versions going around. [Jake Teixeira, "OG", was arrested 23-4-13.] The US-Government is now scrambling to assess and contain the fallout from this leak, while the rest of the world is asking themselves the following questions."

23-4-6 Military analysts said the [leaked] "documents appear to have been modified in certain parts from their original format, overstating American estimates of Ukrainian war dead and understating estimates of Russian troops killed."

Modifications could point to a predictable "effort of disinformation by Moscow", analysts said. However, the "disclosures in the original documents, which appear as photographs of charts of anticipated weapons deliveries, troop and battalion strengths, and other plans, represent a significant breach of American intelligence in the effort to aid Ukraine."

The "documents do not provide specific battle plans", such as "how, when, and where Ukraine intends to launch its offensive, which American officials admit is likely coming in the next month or so. Because the documents are five weeks old, they offer a snapshot of time — the American and Ukrainian view, as of March 1, of what Ukrainian troops might need for the campaign."


*SDO = Social Dominance Orientation 
Social dominance orientation (SDO) is a [disordered] personality trait measuring an individual's support for social hierarchy and the extent to which they desire their in-group be superior to out-groups. SDO is conceptualized under social dominance theory as a measure of individual differences in levels of group-based discrimination; that is, it is a measure of an individual's preference for hierarchy within any social system and the domination over lower-status groups. It is a predisposition toward anti-egalitarianism within and between groups.

Individuals who score high in SDO desire to maintain and, in many cases, increase the differences between social statuses of different groups, as well as individual group members. Typically, they are dominant, driven, tough, and seekers of power. People high in SDO also prefer hierarchical group orientations. Often, people who score high in SDO adhere strongly to belief in a "dog-eat-dog" world. It has also been found that men are generally higher than women in SDO measures. A study of undergraduates found that SDO does not [?] have a strong positive relationship with authoritarianism. Felicia Pratto and her colleagues have found evidence that a high social dominance orientation is strongly correlated with conservative political views, and opposition to programs and policies that aim to promote equality (such as affirmative action, laws advocating equal rights for homosexuals, women in combat, etc.).

Friday, January 21, 2022

Hybrid Warfare, Intelligence ➾ 2022

23-3-14 Ruscist Scourge: West Targeted by HYBRID War - Starsky > .
>> Digital Warfare >>>Hybrid Warfare, Intelligence ➾ 2022 ..

Realities of modern-day intelligence-gathering—and how the US competes in a new age of cyber-espionage. Amy Zegart, the Hoover Institution’s Morris Arnold and Nona Jean Cox Senior Fellow and author of the newly released Spies, Lies, and Algorithms: The History and Future of American Intelligence, joins Hoover senior fellows Niall Ferguson, H .R. McMaster, and John Cochrane for a closer look at intelligence gathering, national security, and geopolitics.

Monday, June 28, 2021

Australia - Military Threat from China

22-4-28 Almost 60% of Australians want Australia to be tougher on China > .
22-4-4 Peter Jennings | China & National Security - John Anderson > .
22-3-30 China’s Secret Plan for a Pacific Military Base - Uncensored > .
22-3-28 Conversation with Senator the Hon Penny Wong - CSIS > .
22-3-27 Avoidable War - Kevin Rudd: US future conflict with China | 9 Aus > .
22-3-16 China: "No. 1 Threat" to the West | Heinrichs - JoAnd > . full > .
22-3-1 Tim Harcourt | Russia's Commodity-Heavy Sanctions & Australia - rh > .
2021 Economic & Military Implications of China's BRI (Kevin Rudd) - Asia Society > .
2021 Australia has rebelled against China (South Korea not followed) - VisPol > .Australia's CCP Problem - Rap >> .
ASEAN, AUKUS, CPTPP, QUAD - Compass Rose >> .
Indo-Pacific Security & Threats - Γαῖα >> .


Resources
Coming Resource Conflicts ..

Just when we thought Australia's relationship with China couldn’t get any worse, Beijing has delivered Australia another punch. It’s in the form of a list of 14 grievances it has with us and is polished off with an almighty threat: if you make an enemy of China, China will be the enemy! [More like: China will drop the smiley mask.] When that belligerence is combined with the upheaval of a new administration in Washington, it’s clear we are facing a dangerous new world order, and the Pacific is likely to be an especially vulnerable region. For the best analysis of what the immediate future might hold, 60 Minutes Australia speaks with H. R. McMaster, a highly respected military man and former U.S. national security adviser. But his expert assessment includes a grim warning. Australia, he reckons, has a battle on its hands.

Paul Dibb AM (born 3 October 1939) is an English-born Australian strategist, academic and former defence intelligence official. He is currently emeritus professor of strategic studies at the Strategic and Defence Studies Centre which is part of the Australian National University.

He was the head of the National Assessments Staff (the predecessor to the Office of National Assessments) from 1974 to 1978, the director of the Joint Intelligence Organisation (the predecessor to the Defence Intelligence Organisation) from 1986 to 1988, and the head of the Defence Strategy and Intelligence Group with the rank of Deputy Secretary in the Department of Defence from 1988 to 1991. Dibb is also known for his contribution to Australian defence strategy through writing the 1986 Review of Australia’s defence capabilities, known as the Dibb Report, and being the primary author of the 1987 Defence White Paper. From 1965 to 1984, Dibb worked for the Australian Security Intelligence Organisation, tasked with gaining intelligence and recruiting KGB and GRU agents in Canberra. In 1991, Dibb retired from the Australian Public Service and became the director of the Strategic and Defence Studies Centre, part of the Australian National University until 2003–where he is currently the emeritus professor. During the Government of Prime Minister John Howard, Dibb was a member of the Foreign Minister's Foreign Policy Advisory Council.

Dibb's report was published in March 1986 and recommended for Australia to abandon the remaining elements of the forward defence policy but concentrate its military resources on the geographic areas relevant to defending the country and its economic interests from direct attack.

Dibb's recommendations were based around an assessment that "Australia is one of the most secure countries on earth" and that while there was the potential for regional conflict, the longer-term intentions and capabilities of countries in Australia's region could not be predicted and so did not form a suitable basis for planning.

Dibb recommended for Australia's military posture to be based on a strategy of denying aggressors the ability to attack the country. That was to be achieved through using a layered defence of Jindalee Operational Radar Network (over-the-horizon radar), patrol aircraft and maritime strike aircraft to protect Australia's approaches with the Army's Operational Deployment Force being responsible for defeating any landings on the Australian mainland. That would require changes to the Australian Defence Force's structure and equipment acquisition programs. The policy of self-reliance proposed by Dibb also placed less emphasis on ANZUS, its alliance with the United States, than previous policies.

The Dibb Report received a mixed response. Some experts regarded it as being an important contribution to developing an independent Australian defence posture. Other experts criticised the report for calling for an essentially defensive military strategy, implying that existing Australian military capabilities be abandoned and making optimistic assumptions about the period of time available to detect and respond to new threats to Australia. Many of the Dibb Report's assumptions were used in developing the 1987 Defence White Paper, but the Government did not adopt some of Dibb's key recommendations, such as those concerning Australia's relationship with the United States and the Australian military's role in the Pacific.

2019: China has released a new white paper on national defense, laying out the country's military preparedness and security strategy. It singled out the United States, Japan and Australia as actors allegedly causing security uncertainties in the Pacific region. The paper discusses those nations' moves to beef up their military presence and alliances. China claimed its own military does not pose a threat. Chinese officials say one of their top concerns remains independence movements in Tibet and in the northwestern Chinese province of Xinjiang. The paper also goes on to warn against independence for Taiwan, a self-governed island that China claims as part of its territory.


Tuesday, April 20, 2021

Indo-Pacific Alliances

> PLA > 
X imperialism

Thursday, February 25, 2021

Drone Comparisons - Military UCAVs

23-6-30 Directed Energy Weapons - Lasers vs Drones, Missiles - T&P > .
23-6-13 NATO IAMD | NATO Integrated Air and Missile Defence > .
23-6-13 Drones and the Dystopian Future of War - Journeyman > .
23-6-11 Rocket Roulette: Ruscia uses drones & missiles against Ukraine - U24 > .
23-6-7 Ukrainian Defense Tech Boom - War Startups - U24 > .
23-2-12 Small Drones & Loitering Munitions - Cheap Precision - Perun > .
22-11-16 Taiwan Pushes Drone Warfare to Counter Xina - Uncensored > .
2013 Rise of the Drones (FULL doc) | NOVA | PBS > .
22-11-11 Economics of Kamikaze Drones - nwyt > . skip > .
22-10-27 Pooti's [Desperate] Iranian Drones | Peter Zeihan, Ben Hodges > .

Drone Comparisons - Military UCAVs ..

An unmanned combat aerial vehicle (UCAV), also known as a combat drone, colloquially shortened as drone or battlefield UAV, is an unmanned aerial vehicle (UAV) that is used for intelligence, surveillance, target acquisition, and reconnaissance and carries aircraft ordnance such as missiles, ATGMs, and/or bombs in hardpoints for drone strikes. These drones are usually under real-time human control, with varying levels of autonomy. Unlike unmanned surveillance and reconnaissance aerial vehicles, UCAVs are used for both drone strikes and battlefield intelligence. 

An unmanned surveillance and reconnaissance aerial vehicle, is an unarmed military UAV that is used for intelligence, surveillance, target acquisition, and reconnaissance. Unlike unmanned combat aerial vehicle (UCAV), this type of system not designed to carry aircraft ordnance such as missiles, ATGMs, or bombs for drone strikes. The main purpose is to provide battlefield intelligence.

Aircraft of the UCAV type have no onboard human pilot. As the operator runs the vehicle from a remote terminal, equipment necessary for a human pilot is not needed, resulting in a lower weight and a smaller size than a manned aircraft. Many countries have operational domestic UCAVs and many more have imported armed drones or have development programs underway.

TAI Anka Unmanned Aerial Vehicle
TAI Anka is the serial production variant of Anka medium-altitude, long-endurance unmanned aerial vehicle (UAV), which was developed by Turkish Aerospace Industries (TAI) for the Turkish Armed Forces.

This drone is designed to assist both night and day can take on any weather condition that comes its way. The Tai Anka serves the Turkish armed forces. And is equipped with real-time imagining system and Intelligent surveillance due to that it can spot moving targets on ground

Dassault nEUROn Unmanned Aerial Vehicle
The nEUROn UCAV is a european-based consortium project being led by the French concern of Dassault.

The Dassault nEUROn is an Unmanned Combat Air Vehicle (UCAV) technology demonstrator intended to provide participating European powers with a viable, long-term UCAV weapons-capable solution.
 
Dimensionally, the nEUROn has been given a running length of 31 feet with a wingspan of 41 feet, putting it on par with a full-sized manned aircraft design or similar UCAV product such as the Lockheed RQ-170 "Sentinel". It sits empty at 4,900 kilograms and displaces at 7,000 kilograms under a full mission load while power will be derived from a single Rolls-Royce-Turbomeca Adour / SNECMA M88 turbofan engine centrally-located in the fuselage. Maximum speed is estimated at just over 900 miles per hour with a service ceiling expected to reach 46,000 feet. The flight controls and weapons delivery
will be designed will full autonomy in mind, human interaction being held as backup should the need arise.

Sukhoi S-70 Okhotnik Unmanned Aerial Vehicle
Our next drone is the S-70 Okhotnik, also known as the Hunter B. This machine flown aircraft belonged to the Russians and was developed by Sukhoi and the Russian Aircraft Corporation.
 
Russia is accelerating the development of multiple long-range attack UAVs to compete with the US and China who are ahead in the combat drone race. This six-generation aircraft is somewhat similar to the Mikoyan Skat fighting jet and features its best qualities

Bayraktar TB2 Unmanned Aerial Vehicle
Bayraktar TB2 is a medium altitude and long-range tactical unmanned aerial vehicle (UAV) system manufactured by Baykar Makina, for the Turkish Armed Forces.

This aircraft is not human-driven but is remotely controlled and has autonomous flight operations. The Bayraktar TB2 was developed by Turkey′s Baykar company to serve the Turkish Air Force and aid in reconnaissance and intelligence combat

Lockheed Martin RQ-170 Sentinel Unmanned Aerial Vehicle
The RQ-170 Sentinel is a high altitude and long-endurance unmanned aerial vehicle (UAV) designed and manufactured by Skunk Works, a division of Lockheed Martin Corporation, for the United States Air Force (USAF).

The RQ-170 Sentinel, created by Lockheed Martin, was designed to serve the United States Air Force working with the CIA. This drone differs from others we have seen today as it is tailless and built with specialized features

The UAV can capture real-time imagery of the battlefield and transfer the data to the ground control station (GCS) through a line of sight (LOS) communication data link.
General Atomics MQ-1 Predator Unmanned Aerial Vehicle

The RQ-1 Predator is a long-endurance, medium-altitude unmanned aircraft system for surveillance and reconnaissance missions.

MQ-1 Predator, created by General Atomics. The maximum take-off weight is a little over 2250lbs with an air cruise of up to 217 km/ h 135 miles per hour at 25,000 feet.
Surveillance imagery from synthetic aperture radar, video cameras and a forward-looking infrared (FLIR) can be distributed in real-time both to the front line soldier and to the operational commander, or worldwide in real-time via satellite communication links.
This machine is powered by a Rolls-Royce AE 3007 turbofan-engine. It is packed with 8,500 pounds of thrust and 36 hours of flight time. RQ-4 Global Hawk is used frequently by NASA and has a distinct look, as you would have noticed. The RQ-4 Global Hawk has a Synthetic-Aperture-Radar (SAR) with high resolution.

Larger UAVs are used for strategic reconnaissance. The most important of these is the U.S. RQ-4 Global Hawk, a jet-powered craft 44 feet (13 metres) long and with a wingspan of 116 feet (35 metres). The Global Hawk has a cruise speed of 391 mph (629 km) per hour and an endurance of some 36 hours, and it carries a variety of photographic, radar, and electronic sensors.

sī vīs pācem, parā bellum

igitur quī dēsīderat pācem praeparet bellum    therefore, he who desires peace, let him prepare for war sī vīs pācem, parā bellum if you wan...