Military and intelligence history mostly dealing with World War II.
Showing posts with label MI5. Show all posts
Showing posts with label MI5. Show all posts
Sunday, December 1, 2019
Saturday, February 24, 2018
Coldspur’s website
I’ve added a
link to Tony Percy’s website coldspur.com
Monday, September 23, 2013
NSA spying and the threat of terrorism/spying/cyber war etc etc
Ever since
the former NSA employee Edward
Snowden revealed the extent of NSA’s and GCHQ’s internet spying there has
been a backlash against the secretive and obviously unlawful operations of NSA
and its allies.
On the one
hand people have complained about the indiscriminate interception of the entire
world’s internet and phone traffic, while the other (much less numerous) side, made
up of people associated with the NSA and the US intelligence community, has
tried to make the argument that even if certain laws were broken it was all in
the interest of ‘national security’.
According to
their side people should just shut up and deal with the complex realities of
cyber warfare, internet spying and all that jazz. Oh and of course we shouldn’t
listen to Snowden cause he’s just a Chinese/Russian spy and has psychological
problems and and and.
That strategy
was more or less effective at the start of this story and I remember that many (independent?)
media started focusing on Snowden and not on the Orwellian policies of the NSA.
It is a
testament to the professionalism of Snowden’s collaborator Glenn Greenwald that important material is
released in a steady basis, so the media aren’t overwhelmed by the information.
This means that critics have to focus on the NSA activities and cannot
sidetrack the discussion with accusations about Snowden’s motives or his
personal life.
This strategy
of the Snowden team has left the ‘defenders of the realm’ holding their dick in
their hands (as we say in Greece) …
Now the
question of surveillance/spying and the limits that have to be imposed is a
difficult issue. The defenders of the NSA can claim that they need to intercept
everything, subvert codes and break computer software because that will help
them arrest spies, terrorists and other bad guys.
Looking back
through history it is interesting to compare their efforts with the activities
of the British intelligence agencies during WWII.
The Brits had
to deal with foreign states like Germany, Japan, Italy and the Soviet Union
that had extensive espionage networks throughout the world and were often
supported by other ‘neutral’ countries.
Although in
1939-40 British intelligence was woefully inadequate during the war their
performance picked up and they were able to dismantle enemy networks and build
up their presence in ‘neutral’ countries like Spain, Turkey, Sweden and
Switzerland.
In their
efforts they were assisted by signals intelligence. The German intelligence
agency Abwehr used the Enigma G cipher
machine for communication between main stations. This device was ‘solved’
by the Brits in late 1941 and
most traffic in the period 1942-45 was solved. Agents abroad relied on hand
ciphers, mainly substitution systems. Again most of these could be solved by Bletchley
Park during the war.
Through
signals intelligence the Brits were able to learn quite a lot about the German
spy networks and the Abwehr OOB.
Notice that
their operation was targeted, they didn’t intercept everything nor did they
have to treat their own population as a security risk. Mail was checked for
secret writing and microdots but in this case we are talking about a time of
war not peace like today.
All these
measures must have saved Britain! If it wasn’t for the ‘defenders of the realm’
then obviously they’d be speaking Deutsche and eating weisswurst today. Or maybe there is another explanation?
Let’s have a
look at the official history ‘British
Intelligence in the Second World War: Volume 4, Security and
Counter-Intelligence’ as it should clear things up. In page 280
it says that wartime successes in counterintelligence depended on a combination
of factors, the most important being:
‘Great Britain being an island, it was possible in war-time to impose strict
control of entry which could not be easily evaded. The vulnerable back door via
the uncontrollable frontier between Northern Ireland and Eire was protected by
the Eire government's vigorous action
against the IRA and its determination that Eire should not be used as a base
for espionage or sabotage against the United Kingdom. Besides this geographical
advantage, in 1939 and throughout the war the United Kingdom had a homogeneous population in which patriotism
was still regarded as a cardinal virtue and which, apart from a numerically
insignificant minority, was deeply hostile to the Nazi regime. What the
Security Executive described as the 'different loyalty' of the leadership and
indoctrinated cadres of the CPGB helped Germany only incidentally, and only
until she attacked the Soviet Union in June,1941.’
So maybe
instead of intercepting our internet and phone traffic the Americans can follow
these simple guidelines:
1). Make sure
their borders are secure and work with Canada and Mexico to ensure this.
2). Have
faith in the patriotism of their countrymen to report suspicious activity and
deny help to evil spies, terrorists, hackers etc.
But doing
something so simple would mean the US intelligence budget would need to be much
smaller than 50 plus billion, wouldn’t it?
Sunday, June 24, 2012
Insecurity of Greek codes - Part 2
In a previous piece I looked into the lack of security of Greek codes during WWII. The systems used by the Greeks were solved cryptanalytically by the Germans.
It seems that post war both the Soviet Union and Britain were able to gain access to our secret diplomatic communications. This time however it was thanks to ‘bugs’ and spies rather than cryptanalysis.
One step forward, two steps back…
Let’s take a look at the relevant information:
From ‘The Mitrokhin Archive-The KGB in Europe and the West’, p458
Despite the Sixteenth Directorate's reluctance to share most SIGINT secrets with its intelligence allies, it depended on their assistance. With the growing complexity of computer-generated cipher systems, Soviet cryptanalysts were increasingly dependent on the penetration of foreign embassies to steal cipher materials and, when possible, bug cipher machines and teleprinters. During 1974 alone joint operations by the FCD Sixteenth Department and its Soviet Bloc allies succeeded is abstracting cipher material from at least seven embassies in Prague, five in Sofia, two in Budapest and two in Warsaw. Soviet Bloc intelligence services also shared some of their agents in Western embassies and foreign ministries with the KGB. Among those who were particularly highly rated by the KGB Sixteenth Directorate was a Bulgarian agent codenamed EPIR, a security official in the Greek foreign ministry recruited by Bulgarian intelligence in 1966. Over the next ten years he assisted in the removal of over 12,000 classified pages of documents from the ministry.
From ‘Spycatcher: the candid autobiography of a senior intelligence officer’, p113
After STOCKADE, plans were laid to attack most European ciphers, starting with the Germans. But after much effort, we aborted the operation, because their machines were too well screened. But we successfully placed a probe microphone behind the cipher machine in the Greek Embassy in London. This was a particularly valuable target, since the Greeks were giving considerable support to Colonel Grivas, the Cypriot guerrilla leader, during the Cyprus Emergency.
From 'SOVIET COMINT IN THE COLD WAR' by David Kahn in Cryptologia (Volume 22, Issue 1, January 1998, pages 1-24), p8-9
Kahn’s information comes from an interview with Victor Makarov a translator of Greek intercepts at the KGB’s 16th Directorate. Makarov gives several examples from the messages he translated:
During the Israeli siege of Beirut in August 1982 the Greek ambassador had a meeting with Yasser Arafat who asked for the Greek prime minister Andreas Papandreou to intervene diplomatically.
In 1981 a message from the Washington embassy had details of a meeting between the Greek ambassador and American officials which concerned events in Eastern Europe and especially the Solidarity movement in Poland. The Russians found the information very interesting.
Conclusion:
Greek communications security was poor during WWII. It seems that post war this problem was corrected by using cipher teleprinters with OTP tape.
However during the Cold war interested parties were able to sidestep the unbreakable OTP code by using ‘bugs’ and spies.
Small countries should make every effort to protect their communications. Are Greek communications secure today? Probably not.
Subscribe to:
Posts (Atom)