Topic: Espionage (Page 2)

You are looking at all articles with the topic "Espionage". We found 26 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Crypto AG

πŸ”— United States πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Companies πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Switzerland πŸ”— Military history/Cold War πŸ”— Sweden

Crypto AG was a Swiss company specialising in communications and information security. It was secretly jointly owned by the American Central Intelligence Agency (CIA) and West German Federal Intelligence Service (BND) from 1970 until about 1993, with the CIA continuing as sole owner until about 2018. With headquarters in Steinhausen, the company was a long-established manufacturer of encryption machines and a wide variety of cipher devices.

The company had about 230 employees, had offices in Abidjan, Abu Dhabi, Buenos Aires, Kuala Lumpur, Muscat, Selsdon and Steinhausen, and did business throughout the world. The owners of Crypto AG were unknown, supposedly even to the managers of the firm, and they held their ownership through bearer shares.

The company has been criticised for selling backdoored products to benefit the American, British and German national signals intelligence agencies, the National Security Agency (NSA), the Government Communications Headquarters (GCHQ), and the BND, respectively. On 11 February 2020, The Washington Post, ZDF and SRF revealed that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence, and the spy agencies could easily break the codes used to send encrypted messages. The operation was known first by the code name "Thesaurus" and later "Rubicon".

Discussed on

πŸ”— Operation Ivy Bells

πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Maritime warfare πŸ”— Cold War

Operation Ivy Bells was a joint United States Navy, Central Intelligence Agency (CIA), and National Security Agency (NSA) mission whose objective was to place wire taps on Soviet underwater communication lines during the Cold War.

Discussed on

πŸ”— WWII: Failed novelist becomes a spy for Germany, makes up a fake spy network

πŸ”— Biography πŸ”— Espionage πŸ”— Military history πŸ”— Military history/Military biography πŸ”— Biography/military biography πŸ”— Military history/Intelligence πŸ”— United Kingdom πŸ”— Military history/World War II πŸ”— Military history/German military history πŸ”— Military history/Spanish military history πŸ”— Spain πŸ”— Military history/European military history πŸ”— Military history/British military history

Juan Pujol GarcΓ­a (Spanish: [ˈxwan puˈʝol Ι£aɾˈθi.a]; 14 February 1912 – 10 October 1988), also known as Joan Pujol i GarcΓ­a (Catalan: [Κ’uˈan puΛˆΚ’Ι”l i Ι£Ι™ΙΎΛˆsi.Ι™]), was a Spanish spy who acted as a double agent loyal to Great Britain against Nazi Germany during World War II, when he relocated to Britain to carry out fictitious spying activities for the Germans. He was given the codename Garbo by the British; their German counterparts codenamed him Alaric and referred to his non-existent spy network as "Arabal".

After developing a loathing of political extremism of all sorts during the Spanish Civil War, Pujol decided to become a spy for Britain as a way to do something "for the good of humanity". Pujol and his wife contacted the British Embassy in Madrid, which rejected his offer.

Undeterred, he created a false identity as a fanatically pro-Nazi Spanish government official and successfully became a German agent. He was instructed to travel to Britain and recruit additional agents; instead he moved to Lisbon and created bogus reports about Britain from a variety of public sources, including a tourist guide to Britain, train timetables, cinema newsreels and magazine advertisements.

Although the information would not have withstood close examination, Pujol soon established himself as a trustworthy agent. He began inventing fictitious sub-agents who could be blamed for false information and mistakes. The Allies finally accepted Pujol when the Germans expended considerable resources attempting to hunt down a fictitious convoy. Following interviews by Desmond Bristow of Section V MI6 Iberian Section, Juan Pujol was taken on. The family were moved to Britain and Pujol was given the code name "Garbo". Pujol and his handler TomΓ‘s Harris spent the rest of the war expanding the fictitious network, communicating to the German handlers at first by letters and later by radio. Eventually the Germans were funding a network of 27 agents, all fictitious.

Pujol had a key role in the success of Operation Fortitude, the deception operation intended to mislead the Germans about the timing, location and scale of the invasion of Normandy in 1944. The false information Pujol supplied helped persuade the Germans that the main attack would be in the Pas de Calais, so that they kept large forces there before and even after the invasion. Pujol had the distinction of receiving military decorations from both sides of the war – being awarded the Iron Cross and becoming a Member of the Order of the British Empire.

πŸ”— Echelon (signals intelligence)

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— United States/Military history - U.S. military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— United Kingdom πŸ”— Military history/Australia, New Zealand and South Pacific military history πŸ”— Military history/Canadian military history πŸ”— Military history/European military history πŸ”— Military history/British military history

ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the United States with the aid of four other signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, and the United Kingdom, also known as the Five Eyes.

Created in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971.

By the end of the 20th century, the system referred to as "ECHELON" had evolved beyond its military and diplomatic origins into "a global system for the interception of private and commercial communications" (mass surveillance and industrial espionage).

Discussed on

πŸ”— Useful Idiots

πŸ”— International relations πŸ”— Espionage πŸ”— Soviet Union πŸ”— Russia πŸ”— Russia/history of Russia πŸ”— English Language

In political jargon, a useful idiot is a derogatory term for a person perceived as propagandizing for a cause without fully comprehending the cause's goals, and who is cynically used by the cause's leaders. The term was originally used during the Cold War to describe non-communists regarded as susceptible to communist propaganda and manipulation. The term has often been attributed to Vladimir Lenin, but this attribution is unsubstantiated.

Discussed on

πŸ”— United States involvement in regime change

πŸ”— United States πŸ”— International relations πŸ”— Espionage πŸ”— History πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Politics πŸ”— Politics/American politics πŸ”— United States/U.S. history

United States involvement in regime change describes United States government participation or interference, both overt and covert, in the replacement of foreign governments. In the latter half of the 19th century, the U.S. government initiated actions for regime change mainly in Latin America and the southwest Pacific, including the Spanish–American and Philippine–American wars. At the onset of the 20th century, the United States shaped or installed governments in many countries around the world, including neighbors Panama, Honduras, Nicaragua, Mexico, Haiti, and the Dominican Republic.

During World War II, the United States helped overthrow many Nazi Germany or imperial Japanese puppet regimes. Examples include regimes in the Philippines, Korea, the Eastern portion of China, and much of Europe. United States forces were also instrumental in ending the rule of Adolf Hitler over Germany and of Benito Mussolini over Italy. After World War II, the United States in 1945 ratified the UN Charter, the preeminent international law document, which legally bound the U.S. government to the Charter's provisions, including Article 2(4), which prohibits the threat or use of force in international relations, except in very limited circumstances. Therefore, any legal claim advanced to justify regime change by a foreign power carries a particularly heavy burden.

In the aftermath of World War II, the U.S. government struggled with the Soviet Union for global leadership, influence and security within the context of the Cold War. Under the Eisenhower administration, the U.S. government feared that national security would be compromised by governments propped by the Soviet Union's own involvement in regime change and promoted the domino theory, with later presidents following Eisenhower's precedent. Subsequently, the United States expanded the geographic scope of its actions beyond traditional area of operations, Central America and the Caribbean. Significant operations included the United States and United Kingdom-orchestrated 1953 Iranian coup d'Γ©tat, the 1961 Bay of Pigs Invasion targeting Cuba, and support for the overthrow of Sukarno by General Suharto in Indonesia. In addition, the U.S. has interfered in the national elections of countries, including the Philippines in 1953, and Japan in the 1950s and 1960s as well as Lebanon in 1957. According to one study, the U.S. performed at least 81 overt and covert known interventions in foreign elections during the period 1946–2000. Another study found that the U.S. engaged in 64 covert and six overt attempts at regime change during the Cold War.

Following the dissolution of the Soviet Union, the United States has led or supported wars to determine the governance of a number of countries. Stated U.S. aims in these conflicts have included fighting the War on Terror, as in the ongoing Afghan war, or removing dictatorial and hostile regimes, as in the Iraq War.

Discussed on

πŸ”— The Cuckoo's Egg

πŸ”— Espionage πŸ”— Books πŸ”— Computer Security πŸ”— Computer Security/Computing

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at the Lawrence Berkeley National Laboratory (LBNL).

Discussed on

πŸ”— LOVEINT

πŸ”— United States πŸ”— Espionage πŸ”— Law Enforcement

LOVEINT is the practice of intelligence service employees making use of their extensive monitoring capabilities to spy on their love interest or spouse. The term was coined in resemblance to intelligence terminology such as SIGINT, COMINT or HUMINT.

Discussed on

πŸ”— Lincolnshire Poacher (numbers station)

πŸ”— Espionage πŸ”— Radio Stations

The Lincolnshire Poacher was a British powerful shortwave numbers station that transmitted from Cyprus from the mid-1970s to June 2008. The station gained its commonly known name as it uses bars from the English folk song "The Lincolnshire Poacher" as an interval signal. The radio station was believed to be operated by the British Secret Intelligence Service and emanated from the island of Cyprus. Amateur direction finding linked it with the Royal Air Force base at Akrotiri, Cyprus, where several curtain antennas had been identified as being its transmitter. It consisted of an electronically synthesised English-accented female voice reading groups of five numbers: e.g. '0-2-5-8-8'. The final number in each group was spoken at a higher pitch. It is likely that the station was used to communicate to undercover agents operating in other countries, to be decoded using a one-time pad.

An Asian numbers station of identical format is believed to have been broadcast from Australia, and nicknamed "Cherry Ripe". It uses several bars from the English folk song of the same name as its interval signal. Cherry Ripe continued to be on-air until December 2009.

Discussed on