Freedom, GEABSOLUTE POWERS CORRUPT ABSOLUTELY, General Election (GE15), Malaysia, Politics, polling Nov 19: Destroy Umno for the betterment of Malaysia, race, religion, Solidality, support Aliran for Justice

Share This

Showing posts with label CIA. Show all posts
Showing posts with label CIA. Show all posts

Sunday 17 March 2024

The more thoroughly exposed the CIA's true face, the better

Mother of all disorder Illustration: Liu Rui/GT

Reuters exclusively reported on Thursday that, according to a former US official with direct knowledge of highly confidential operations, then-US president Donald Trump authorized the Central Intelligence Agency (CIA) to launch secret operations on Chinese social media aimed at "turning public opinion in China against its government." Many people don't find this information surprising or even consider it "news." The US is a habitual offender, using various covert means to foment "peaceful evolution" and "color revolutions" in other countries, with the CIA being the main force employed to this end. For other countries, the US' pervasive influence is everywhere, visible and tangible, so there is no need for exposés.

We are still unclear  what the specific purpose of the "former US official" was in leaking the information to Reuters. A CIA spokesperson declined to comment on the existence of the program, its goals or impact. A spokesperson for the Biden administration's National Security Council also declined to comment, which means it was neither confirmed nor denied. The US intelligence community often uses a mixture of false and true information to create confusion, a tactic that was used on Edward Snowden. The Reuters report is valuable, but needs to be further processed to filter out the true and useful parts.

Firstly, this report carries a strong defense of US penetration into China. It portrays the proactive offensive of the US' cognitive warfare against China as a passive counterattack against "cyber attacks" on the US from China and Russia. In reality, portraying themselves as the weak or victimized party and labeling their hegemonic actions as "justice" is a part of the US' cognitive warfare against foreign countries.

One US official interviewed by Reuters even said it felt like China was attacking the US with "steel baseball bats," while the US could only fight back with "wooden ones," showing his exaggerated and clumsy acting skills. The US has never used a "wooden stick." Over the past few decades, the CIA has overthrown or attempted to overthrow at least 50 legitimate international governments. There are also statistics showing that from 1946 to 2000, the US attempted to influence elections in 45 countries 81 times to achieve regime change. As a habitual offender of manipulating public opinions, the US has long established a series of tactics in its targeted propaganda, information dissemination, event creation, rumor fabrication, incitement of public opinion, and media manipulation. It constantly creates new tactics and uses new technologies according to changing circumstances. This is an open secret. The US dressing itself up as a "little lamb" only has a comedic effect, not a propaganda effect.

Next, as the US' intervention and infiltration in other countries are covert operations, this disclosure provides an opportunity for the outside world to glimpse into the specific methods used by the US. For example, the whistleblower admitted that the CIA had formed a small team of operatives, using bogus online identities to spread damaging stories about the Chinese government while simultaneously disseminating defamatory content to overseas news agencies. This corroborates with previous statements by CIA Director William Burns, indicating increased resources being allocated for intelligence activities against China, once again confirming the existence of the US "1450" (internet water army) team targeting China.

The whistleblower admitted that the CIA has targeted public opinion in Southeast Asia, Africa, and the South Pacific region, spreading negative narratives about the Belt and Road Initiative. This indicates that in the US-instigated propaganda war against China, the global public opinion arena, especially in "Global South" countries, is their main strategic target. Various "China threat" theories circulating in third-party countries, as consistently pointed out by China, are all being operated by the US intelligence agencies behind the scenes.

The US has never concealed its hegemonic aims, nor does it regard encroachment on other countries' sovereignty as something to be ashamed of, which is even more infuriating than the hegemonic behavior itself. American economist Jeffrey Sachs criticized the CIA's blatant violation of international law in his commentary last month, stating that it is "devastating to global stability and the US rule of law," leading to "an escalating regional war, hundreds of thousands of deaths, and millions of displaced people." He also criticized the mainstream American media for failing to question or investigate the CIA. In fact, far from acting as watchdogs, mainstream American media has served as an accomplice. How many rumors manufactured by the CIA have been spread through the mouths of mainstream American media? When did they reflect and correct themselves?

We also see that the intentions of the US intelligence agencies are even more sinister. As admitted in the revelations, they aim to force China to spend valuable resources in defending against "cognitive warfare," keeping us busy with "chasing ghosts," and disrupting our development pace. First of all, we appreciate their reminder. At the same time, we will not allow external factors to interfere with our strategic determination to manage our own affairs well. For China and the world, the more fully, clearly, and thoroughly the CIA exposes itself, the deeper people will understand its true nature, and the stronger their ability to discern the truth will become. Keeping the CIA busy to no end or failing in their attempts is the best preventive effect.

Source linkl

How the CIA Destabilizes the World


 

Friday 5 May 2023

‘Empire of hackers’ uncovered


BEIJING: An investigation report was released on the Central Intelligence Agency (CIA) of the United States, one of the major intelligence agencies of the US federal government, revealing an “empire of hackers” under US manipulation.

Over a long period, the CIA has been secretly orchestrating “peaceful evolution” and “colour revolutions” around the world, continuously conducting espionage activities, said the report by China’s National Computer Virus Emergency Response Centre and internet security company 360.

The rapid development of the internet this century has presented new opportunities for the CIA to conduct its infiltration, subversion and trouble-making activities, the report said.

The report disclosed important details of the weapons the CIA used for cyberattacks and details of specific cybersecurity cases taking place in China and other countries, and revealed the agency’s harmful activities including cyberattacks and espionage.

The report said it was meant to provide references and suggestions for victims of cyberattacks around the world.

The CIA has been involved in overthrowing or attempting to overthrow more than 50 legal governments of other countries, though it only admitted involvement in seven, causing turmoil in relevant countries, the report said.

It said the involvement of some Western countries with the help of the internet can be detected in multiple “colour revolution” cases.

After the “Arab Spring” in West Asia and North Africa, certain large multinational internet enterprises of the United States vigorously engaged in sending an abundance of personnel, material and financial resources to the conflicting sides, drawing over and supporting the opposition parties, and publicly challenging the legal governments of foreign countries that were not in the US interests. Such enterprises were also involved in assisting in the disinformation campaign and fanning the flames of protests among the public, the report said.

The report further cited several measures of such operations, including “The Onion Router (TOR)” technology that enables anonymous communication, developed by a US company with a reportedly US military background. It was provided free of charge to anti-government personnel in countries such as Iran, Tunisia and Egypt to help them evade surveillance.

Also, Google and Twitter developed a special service called “Speak2Tweet” to enable users to communicate when they are disconnected. The technology was used by anti-government forces in Tunisia and Egypt, said the report.

The cyberspace hegemony under US manipulation is shadowing the entire world, with the CIA launching automated, systematic and intelligent attacks worldwide, the report said.

After analysing relevant cases, the technical team found that the reach of such attack weapons has covered almost all internet and Internet of Things assets, making a foreign country susceptible to US control or espionage, the report said, adding that the US is a genuine “empire of hackers.” — Xinhua 

Source link

 

'Empire of hacking' exposed: China Daily editorial

 

Although the Central Intelligence Agency had acquired exceptional experience in overthrowing governments by triggering "peaceful evolution" or instigating "color revolutions" in other countries before the emergence of the internet, it is the advancement of information and communication technology, in which the US enjoys huge advantages, that has greatly boosted the intelligence agency's capability to accomplish its goals in the new century.

The disintegration of the Soviet Union — the United States established the CIA in 1947 to counter Soviet intelligence wings — transformed the former socialist republics in Eastern and Central Europe, and created a golden opportunity for the CIA to trigger "color revolutions" in the region as well as in the Middle East and Central Asia.

The end of the Cold War gave the CIA the reason to help establish the US' global hegemony by exploiting its advantages in cyberspace to infiltrate, spy on and subvert other countries' governments.

A report "Empire of Hacking: the US Central Intelligence Agency — Part I" jointly published by China's National Computer Virus Emergency Response Center and the 360 Total Security, a Chinese cybersecurity company, on Thursday deserves credit for not only its systematic and professional approach to the ugly role of the CIA, but also its advice to the agency's "victims all around the world" in order to help them better respond to the US' cyberattacks and manipulations.

The report can also be seen as part of China's efforts to help build a community with a shared future in cyberspace, because it regards maintaining silence in the face of the CIA's dirty tricks as being complicit in the US' overall destructive strategy.

The report says that, working with US internet companies, the CIA provides encrypted network communication services, and reconnects service and on-site command communication tools directly for its proxies in targeted countries and regions. For instance, a software called RIOT, developed and promoted jointly by US companies and the CIA, helps the intelligence agency to remote control its pawns triggering demonstrations and riots in other countries, by ensuring they have reliable internet connection and channels of communication that are free from the local government's supervision.

"We lied, we cheated, we stole … we had entire training courses," said Mike Pompeo, former US secretary of state, on the nature of the CIA, an agency he led as director for years. This fact resonates with anyone who reads the NCVERC report.

The US is a country which pledges to help improve cyberspace governance and build a "clean internet" but actually spends all its expertise and high-tech advantages to further sharpen its cyber-espionage and cyber-attack weapons, while claiming to be the largest victim of cyberattacks. 

 

     Related news:


China's National Computer Virus Emergency Response Center and cybersecurity company 360 jointly released an investigation report on Thursday, revealing the long-standing use of cyber attacks by the US Central Intelligence Agency (CIA) against other countries. While this is an "eye-opener" for many people, the CIA's obsession and ability to create unrest disturb them significantly.

 Related posts:

China captures powerful US NSA cyberspy tool

 

 

 

 

 

 

 

U.S. intelligence leak, How extensive is the US surveillance network and how deep does it penetrate the world?

 

 

 

 

 

 

Ending the dollar dominance as USA Weaponising global money


The new Cold War heats up

Tuesday 13 September 2022

Under banner of 'counter-terrorism' 9/11: US exports instability and plunders foreign resources for 21 years, US and the west must brace for great reset as new voices rise up

 

Under banner of 'counter-terrorism,' US exports instability and plunders foreign resources for 21 years

  https://www.globaltimes.cn/page/202209/1275032.shtml

Sunday marks the 21st anniversary of the 9/11 attacks. Amid the mourning for the victims, it's apparent that much of the world in the past two decades has been impacted by the US government' vengeance wars against terrorism, though the global situation has only got more complicated and chaotic.

The West needs to brace for the Great Reset as new voices rise up ...

The West needs to brace for the Great Reset as new voices challenge the established world order

Illustration: Craig Stephens

  • China’s rise and America’s failings have shifted world opinion and set the scene for Asia and the rest to clash with the US and Europe over ideologies and values

  • As geopolitical tensions rise, a Hong Kong used to Western voices will benefit by more deeply understanding Asian perspectives 


We have entered the Age of the Great Reset. We are likely to come out at the other end with a world quite different from the one we have become used to. Let’s hope it will be a better one.

The perspectives of non-Western experiences are increasingly being articulated and heard, and new voices are challenging the dominant narratives.

History can explain the collision of ideologies and values between the East and West, and between the North and South.

The second world war was followed by a period of decolonisation in the Asia-Pacific and Africa between 1945 and the 1970s. Many new nations struggled to establish stability after long periods of imperial rule when their land, resources and labour were exploited.

Civil war broke out in China after Japan was defeated. Just as in much of Asia, Chinese people were dirt poor when the People’s Republic was created in 1949 and they remained among the poorest in the world until relatively recently. 

https://multimedia.scmp.com/news/china/article/2176472/china-reforms/index.html?src=article-launcher

The era of decolonisation coincided with the Cold War, a period of intense rivalry between the United States and Soviet Union. America was wary of Soviet communism and its expansion, and the USSR resented the US for its policy of containment to check its power.

The Cold War may be said to have ended with the dissolution of the Soviet Union in 1991. The dominant narrative then was that the superiority of the American democratic-capitalist system enabled the US to “win” because it could outdo the Soviets in amassing weaponry and generating material wealth.

Asia has become a fast-growing economic region. It’s advancement has been a result of improving education of the people, integrating Asian economies into the global system through export production, and strengthening the capacity of public institutions.

African countries have been making strides too, especially since 2000, in their socio-economic advancement and governance performance. 


Top Chinese diplomat tours East Africa to promote peace, ensure stability for belt and road allies

As a result of the progress being made in these parts of the world, diverse perspectives about ideologies and values, as well as how countries are conducting their international affairs, have come to the fore. 

Every Saturday A weekly curated round-up of social, political and economic stories from China and how they impact the world.

The US has been forcing the pace of the Age of the Great Reset. Its seemingly orderly governing system and successful market-capitalist economic and financial systems used to be seen as the model to emulate. That has changed.

The US invasion of Iraq in 2003 and the financial crisis of 2008 may be seen as watershed moments that started to shift world opinion. 

More than 100 lavish palaces and villas of Iraq’s former dictator Saddam Hussein lie in ruins 


More than 100 lavish palaces and villas of Iraq’s former dictator Saddam Hussein lie in ruins

The claimed intent of the Americans was to free Iraqis from their authoritarian leader, and Iraq supposedly had weapons of mass destruction that endangered the world. However, Iraq did not possess such weapons – the claim was later exposed as a lie – and the US actions destabilised not only Iraq but the Middle East as a whole.

The 2008 financial crisis gave rise to doubts and a distrust of Western financial practices, and exposed the weaknesses, especially of the American regulatory and supervisory systems.

Hank Paulson, former head of the US Treasury, wrote in his book that Wang Qishan – now China’s vice-president – said to him in June 2008 that perhaps the Chinese didn’t have much to learn about finance from America any more.

Fast forward to today, and how the world sees Russia and the Ukraine war provides a good example of the difference in perspectives between the East and West, the North and South. 


Putin tells pupils why Russian troops are in Ukraine in a speech to open school year Putin tells pupils why Russian troops are in Ukraine in a speech to open school year Putin tells pupils why Russian troops are in Ukraine in a speech to open school year

Last June, when asked why Europe should stick up for India if China were to present a challenge, if New Delhi didn’t take a tough stance on Russia now, India’s external affairs minister S. Jaishankar provided a harsh retort: “That’s not how the world works.”

He stressed that India’s problems with China had nothing to do with Russia and Ukraine. And he told Europe to grow out of the mindset that its problems were the world’s problems, but the world’s problems were not Europe’s problems.

The West is unused to hearing such forceful, disagreeing non-Western voices. China is much criticised for what the Western media calls “Wolf Warrior” diplomacy. It is a convenient label for China’s more assertive and combative style in recent years. 


How can China and US stop stumbling towards war? David Shambaugh on Talking Post with Yonden Lhatoo

The pace of the reset is being framed today in simplistic terms – that democracies must fight autocracies, with the US leading the charge together with its Group of 7 allies, and that the “rule-based international order” must be maintained.

That narrative may resonate in the West and North – but not necessarily in the East and South. This can be seen with the G20 meeting scheduled for mid-November – host country Indonesia has insisted that Russia and its leader, Vladimir Putin, should not be excluded from the gathering.

Hong Kong used to be a spot of the West in the East before 1997 when it was a British colony. The city is used to taking note of the mainly Western voices. Hearing different and opposing voices can be uncomfortable because it forces reflection. Hong Kong will benefit by more deeply understanding Asian perspectives.

The reset also has much to do with the US seeing China as the biggest “threat” to “democracy and the international order”. It is corralling allies to fight together, and Taiwan has become a stalking horse to goad Beijing.

The reset will continue and it can be unsettling, especially for Hong Kong, if fighting should break out in the neighbourhood. The world needs better angels to cool geopolitical tensions.

Christine Loh, a former undersecretary for the environment, is an adjunct professor at Hong Kong University of Science and Technology 

 

Thursday 16 June 2022

Exclusive: Report reveals how US spy agencies stole 97b global internet data, 124b phone records in just 30 days

 

Photo: headquarter of NSA in Maryland

 

The US military and government cyber agencies have remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days, which are becoming a major source of intelligence for the US and other "Five Eyes" countries, a latest cybersecurity report showed.

The report the Global Times obtained from Anzer, a cybersecurity information platform, on Monday, once again revealed the "black hand" operations of Tailored Access Operations (TAO), the cyber warfare intelligence agency under the US National Security Agency (NSA), which has been using advanced cyberattack weapons to indiscriminately "grab" data from internet users around the world.

An exclusive report published by the Global Times in May  disclosed that China captured a spy tool deployed by the NSA, which is capable of lurking in a victim's computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of user information. The Trojan horse, "NOPEN," is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device's information.

According to internal NSA documents leaked by hacking group Shadow Brokers, "NOPEN" is one of the powerful weapons used by the TAO to attack and steal secrets.

Anzer's report revealed another weapon platform, "boundless informant," which is the NSA's exclusive big data summary analysis and data visualization tool system capable of colleting, managing and analyzing data around the world illegally obtained by NSA's remote control system.

According to terminal screenshots from the platform, the NSA has remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days.

A cybersecurity analyst told the Global Times on condition of anonymity on Monday that TAO is the largest and most important part of the intelligence division of the NSA.

Founded in 1998, the main responsibility of the TAO is to use the internet to secretly access insider information of its competitors, including secretly invading target countries' key information infrastructure to steal account codes, break or destroy computer security systems, monitor network traffic, steal privacy and sensitive data, and access to phone calls, emails, network communications and messages.

TAO also assumes an important role. When US president issues an order to disable or destroy communications networks or information systems in other countries, TAO will provide relevant cyberattack weapons, and the attacks will be carried out by the US Cyber Warfare Command, the report revealed.

According to the report, the various departments of TAO are composed of more than 1,000 active military personnel, network hackers, intelligence analysts, academics, computer hardware and software designers, and electronics engineers. The entire organizational structure consists of one "center" and four "divisions."

The "center" employs more than 600 people and is responsible for receiving, sorting and summarizing account passwords and important sensitive information stolen from around the world by network information systems controlled remotely by TAO.

"The NSA's global indiscriminate intrusion has long been supported by a vast and sophisticated network of weapons platforms, of which TAO is an important weapon maker. Some of these weapons are dedicated to the products of US internet giants such as Apple, Cisco and Dell, and have been developed with the support and full participation of these internet giants," the expert said.

Media reports showed some US internet giants have set up a special government affairs department to cooperate with the NSA in developing cyber attack weapons and provide the NSA with special backdoors and vulnerabilities. Internal information leaked by Edward Snowden showed these weapons could be used to conduct mass traffic monitoring and hacking on any internet user around the world.

According to publicly available information, most of the cyber attack weapons have already been handed over to the US and other "Five Eyes" countries.

The report also showed more than 500 code names for cyber attacks and data theft operations conducted by TAO have been disclosed, which proves that the US is a developed internet country in the world, as well as a major country in cyber intelligence collection and data theft.

In 2013, the US spent $52.6 billion on global intelligence gathering programs, of which two-thirds went to cyber security operations to carry out cyber attacks on foreign countries and domestic targets in the US.

A large number of TAO's cyber attack weapons have also been shared with some allied countries. Media reports showed that GCHQ, the UK's security and intelligence agency, has used NSA's cyberattack weapons to conduct long-term attack control and communications monitoring in the European Union.

"The US is taking highly engineered cyber weapons as the winning advantage in future cyber warfare, and is investing resources and increasing chips regardless of cost, bringing endless hidden dangers to global cyber security," the expert said. 

 Source link

RELATED ARTICLES

It's a threat to national security | The Star

 https://www.thestar.com.my/opinion/letters/2022/06/14/its-a-threat-to-national-security


Related posts:

China captures powerful US NSA cyberspy tool

 

 

 

 

SOURCE: Data protection dept not doing its job

Act swiftly to prevent data breaches

 

 

 

 

Remain vigilant against financial fraud

 


Wednesday 1 September 2021

Pakatan’s dependency on dubious NED funding, Suaram

Suaram adviser questions Pakatan Harapan's funding from the National Endowment for Democracy

https://www.thestar.com.my/news/nation/2021/08/30/suaram-adviser-questions-pakatan-harapan039s-funding-from-the-national-endowment-for-democracy


MALAYSIAN CIVIL SOCIETY MUST SEVER NED FUNDING TO BE CREDIBLE ( by Kua Kia Soong, SUARAM Adviser, 30.8.2021)

It is painful to watch Malaysian NGOs squirming their way out of justifying NED funding for their activities. The NGO I belong to, SUARAM used to receive funding from the National Endowment for Democracy (NED) until the organisation was exposed as a CIA “soft power” front for the US government several years ago. Knowing the blood-drenched “regime changing” record of th...

Lihat Lagi  https://www.facebook.com/kiasoong.kua/posts/3761531817280035

  

https://youtu.be/DPt-zXn05ac

'We lied, we cheated, we stole', ‘the Glory of American experiment’ by US former Secretary of State/Ex-CIA director Mike Pompeo 

 


PETALING JAYA: Pakatan Harapan should explain its dependence on funding from the National Endowment for Democracy (NED), says Suara Rakyat Malaysia (Suaram) adviser Kua Kia Soong.Inside America's Meddling Machine: NED, the US-Funded Org Interfering in Elections Across the Globe “It is up to Pakatan Harapan to explain their dependence on NED funding if they can,” he said in a statement on Facebook yesterday.

Daniel Twining, the president of the International Republican Institute (IRI) revealed three years ago that they – through NED – had been funding the Opposition in Malaysia since 2002.

NED is a non-governmental organisation in the United States that was founded in 1983 for promoting democracy in other countries by developing political groups, trade unions, deregulated markets and business associations.

Twining allegedly told a forum in 2018 that the IRI, with funds from the NED, had worked to strengthen Malaysian opposition parties and its efforts paid off when Pakatan Harapan won the 14th General Election.

Kua also urged all NGOs in the country to stop accepting funds from NED to remain credible.

Kua said Suaram used to receive funding from the NED until the organisation was exposed as a CIA “soft power” front for the US government several years ago.

“Knowing the blood-drenched ‘regime changing’ record of the CIA in so many third world countries since 1947, we could not continue receiving funds from such a dubious source for our own credibility.

Source link

 

Related:

 

Suaram adviser questions Pakatan Harapan's funding from ...

 

Suaram adviser questions Pakatan Harapan's funding from ...

 

Related posts:

 

  Botched Afghan retreat reveals an America struggling to contain China ` Unable to better China in positive 
 
‘Use science, not politics’   China is concerned that the so-called US intelligence report on the origins of the coronavirus will contain p...
 

Tuesday 28 July 2015

American FBI's China accusation spurred by finance, not a good idea to spy on friends!


On Thursday last week, the FBI released a film entitled The Company Man: Protecting America's Secrets, which targets economic espionage. The 35-minute film features two Chinese economic spies who try to bribe a US employee with money, attempting to acquire insulation technology from the latter's company. The two were later prosecuted and caught in the net of justice. According to media reports, the video has already been shown nearly 1,300 times at US enterprises.

An FBI official publicly voiced that "China is the most dominant threat we face from economic espionage … The Chinese government plays a significant role."

The official also declared that economic espionage has caused losses of hundreds billions of dollars annually to the US economy.

How much is "hundreds of billions of dollars?" Say $300 billion, about 2 percent of US annual GDP.

Since the FBI believes that there has been a 53 percent surge in economic espionage in the US, and 95 percent of US companies suspect that China is the main culprit, does it infer that China has stolen 2 percent of US GDP?

Some people may ponder that given the Cold War is over, Osama bin Laden and Saddam Hussein were eradicated and the war on terror is seemingly not that urgent for the moment, and in light of US federal budget constraints, the FBI needs to find new strategic reasons for more funds. Therefore, the "position" of "Chinese economic spies" has been greatly elevated.

What the FBI has done is bound to injure Sino-US relations. But it is US society that will suffer the most. Many Americans will hence think that their economy is fine, their companies have no problems at all and the only issue is the threat from Chinese economic espionage.

It looks to them like Chinese intelligence services and civilian business spies are much more powerful than the FBI, CIA and other non-governmental intelligence forces combined. China is not capable in every category except for spy technology. This is the logic of the FBI.

If we take a good look at China's overall development in this changing world, you will see that one-third of global new technical patents are now created by Chinese companies every year. Innovation has also become China's national slogan. China will eventually be able to challenge the West's dominance in high technology.

China is well aware that it should learn from the West, especially the US, in terms of technology. But this is not stealing.

US universities are also attracting students from all over the world, yet this brings more benefits than losses to the nation due to the dissemination of knowledge.

Someone who always claims that his house was robbed and feels free to suspect his friend or neighbor is the thief is very annoying, and that is what the US is doing right now. The whole world knows that US intelligent agencies are the most notorious regarding this issue.

We hope that the often-silent Chinese intelligence services could expose some hard evidence of espionage by US spies, and make a spy movie featuring US espionage, providing it with a mirror to look at itself.- Global Times

Not a good idea to spy on friends

THERE's been so much dramatic news these days – from Greece's miseries to Iran, China from blowhard Donald Trump – that the shocking story of how America's National Security Agency has been spying on German and French leadership has gone almost unnoticed.

Last year, it was revealed that the NSA had intercepted Chancellor Angela Merkel's cell phone. She is supposed to be one of Washington's most important allies and the key power in Europe. There was quiet outrage in always subservient Germany, but no serious punitive action.

Brazil's president, Dilma Rousseff, was also bugged by American intelligence. Her predecessor, Luiz Lula da Silva, was also apparently bugged.

This year, came revelations that NSA and perhaps CIA had tapped the phones of France's president, Francois Hollande, and his two predecessors, Nicholas Sarkozy and Jacques Chirac. Hollande ate humble pie and could only summon some faint peeps of protest to Washington. Luckily for the US, Charles de Gaulle was not around. After the US tried to strong-arm France, "le Grand Charles" kicked the US and Nato out of France.

Last week, WikiLeaks revealed that the NSA had bugged the phone of Germany's foreign minister, Frank-Walter Steinmeier, for over a decade. Imagine the uproar and cries "the Gestapo is back" if it were revealed that German intelligence had bugged the phones of President Barack Obama or Secretary of State John Kerry.

A lot of Germans were really angry that their nation was being treated by the Americans as a northern banana republic. Many recalled that in the bad old days of East Germany its intelligence agency, Stasi, monitored everyone's communications under the direct supervision of KGB big brother at Moscow Centre.

The National Security Agency and CIA claim their electronic spying is only aimed at thwarting attacks by anti-American groups (aka "terrorism"). This claim, as shown by recent events, is untrue. One supposes the rational must be a twist on the old adage "keep your enemies close, but your friends even closer".

Ironically, the political leaders listed above – save perhaps Brazil's da Silva – are all notably pro-American and responsive to Washington's demands.

Why would the US risk alienating and humiliating some of its closet allies?

One suspects the reason is sheer arrogance … and because US intelligence could do it. But must US intelligence really know what Mr Merkel is making Mrs Merkel for dinner?

Until WikiLeaks blew the whistle, some European leaders may have known they were being spied upon but chose to close their eyes and avoid making an issue. Raising a fuss would have forced them to take action against the mighty US.

Besides, British, Italian and French intelligence are widely believed to have bugged most communications since the 1950's. But not, of course, the White House or Pentagon. The only nation believed to have gotten away with bugging the White House was Israel during the Clinton years. The Pentagon was bugged by a number of foreign nations, including Israel, China and Russia.

Humiliating Europe's leaders in this fashion is a gift to the growing numbers of Europeans who believe their nations are being treated by the US as vassal states.

There is widespread belief in Western Europe that US strategic policy aims at preventing deeper integration of the EU and thwarting a common foreign policy or a powerful European military. Britain serves as a Trojan horse for America's strategic interests in Europe.

Way back in the 1960's, then German defence minister Franz Josef Strauss, an ardent proponent of a truly united Europe, thundered that Europeans would not play spearmen to America's atomic knights. But, of course, that's just what happened.

The US still runs and finances Nato in the same way the Soviet Union commanded the Warsaw Pact. Washington calls on Europe for troop contingents in its Middle East and south Asian colonial wars in the same way that the Persian Empire summoned its vassals to war.

Many Germans and French, both right and left, would like their leaders to react more forcefully to NSA's ham-handed spying. However, Merkel and Hollande are both political jellyfish eager to evade any confrontation with Big Brother in Washington. Maybe he has too much dirt on them.

But a confrontation is inevitable one day if Europe is to regain its true independence that was lost after World War II.

By Eric S. Margolis who is an award-winning, internationally syndicated columnist. Comments: letters@thesundaily.com

Related articles

Sunday 14 July 2013

Play safe on the mobile, secure your devices!


All a sinister person needs to do to spy on you is to simply penetrate your smartphone or tablet.

OF late, spying has been a household word after revelations of Prism, a clandestine mass electronic surveillance programme operated by the United States National Security Agency (NSA), by former NSA contractor Edward Snowden. 

But one does not need an entire state programme to spy on someone.

All that a sinister person needs to do is to penetrate their intended victim’s smartphone or tablet. Which is quite an easy thing to do, actually. One of the common methods used is spyware.

Such spyware can easily be found by searching on Google although they are usually not free.

There is a possibility that consumers might download spyware from an identified party or an unknown source accidentally. - Goh Chee Hoh

This is what happened when a husband in Singapore suspected his wife of having an affair. On the pretence that his phone was not working, he borrowed his wife’s phone to make a call but instead installed a spyware app.

The husband was then able to see the calls made (but not hear the actual conversation), messages sent and her location at that point, from a computer using a Web-based application that communicated with the app.

When the information confirmed that she was having an affair, he continued to monitor her phone for some time before posting the information online, including the messages she sent to her “lover”. He did not reveal any personal details about themselves but this is how the news became public.

However, many have questioned the authenticity of the story, with some brushing it off as a publicity stunt to sell the spyware app.

Nevertheless, it pays to be safe, as there are apps that can do such things and they are easily obtainable from the Web.


“Mobile phones are an integral part of consumers’ lives, with two thirds of adults worldwide reporting that they use a mobile device to access the Internet,” says David Hall, senior manager of regional product marketing for Norton at Symantec Corporation.

“As we use our mobile phones in new and innovative ways, we’re also putting sensitive information at risk.”

“Spyware is a type of malware (malicious software) that logs information and then forwards that information from your device,” explains Rob Forsyth, director for Asia Pacific at Sophos Ltd.

Usually, such spyware is capable of operating quietly in the background so it can easily go unnoticed by an unsuspecting device owner.

“For a regular user, it is very difficult to figure out that they’ve been infected,” says Goh Su Gim, security advisor for Asia Pacific at F-Secure (M) Sdn Bhd. “There’s no obvious signs.”

In fact, it may surprise you to know that such threats could actually come from a source that’s known to you.

“There is a possibility that consumers might download spyware from an identified party such as their spouse, friends, colleagues, business associates or from an unknown source accidentally,” says Goh Chee Hoh, managing director for South-East Asia at Trend Micro Inc.

As an example, he describes a mobile phone monitoring service which uses Nickispy, a family of viruses that attacks Android devi­ces). It is said to be capable of monitoring a mobile user’s activities and whereabouts. The Chinese website which offers this service charges subscribers fees costing US$300 to US$540 (RM900 to RM1,620).

“This spyware sends MMS to the victim’s mobile device. Once the MMS is downloaded, the cybercriminal is granted access to your line of communications,” Chee Hoh says.

This security issue is further compounded in cases where a consumer uses the same device for both work and personal purposes.

“From a personal user’s standpoint, one can experience loss of privacy whereas from a business perspective, an organisation may lose sensitive data which can lead to loss of revenue,” he explains.

Had such an act been committed in Malaysia, it would go against Section 231 of the Communications and Multimedia Act 1998. Using an app to obtain information from another person’s phone can land the offender a RM50,000 fine or a prison term not exceeding two years if convicted.

The Malaysian Communications and Multimedia commission (MCMC), our multimedia industry nurturer and regulator, also said that it does not act alone when pursuing offenders.

“We look at each case individually and help other agencies like the police, for example, when upholding the law,” said Sheikh Raffie Abd Rahman, MCMC head of strategic communications.



Simple safeguards to keep your devices secure

While the mobile security and privacy threats remain very real and imminent, the steps to prevent such problems are really quite straightforward and easy to do.

Following are some practical tips, courtesy of security specialists Symantec Corporation, Sophos Ltd, Trend Micro Inc and F-Secure (M) Sdn Bhd, that you should take note of:

1. Use your device’s built-in security features 

Configure your security settings so that functions such as location sharing are disabled and passwords are not saved but need to be manually keyed in each time.

You can also make your device more secure by activating its lock function and requiring an identification action such as a fingerprint scan, keystroke pattern, numeric PIN or alphanumeric password in order to access the device.

2. Use strong passwords and secure Internet connections

Unique and strong passwords will help prevent valuable information from being stolen from your device. Using a different password for each and every app would be best but you would need to ensure that you have a good way of remembering those passwords if you choose to go this route.

Avoiding open and unsecured Internet connections such as free public WiFi will also reduce risk of online threats on your mobile device.

3. Never jailbreak or root your device 

Use your device as recommended by the manufacturer instead of modifying the version of the iOS or Android operating system that has been installed. This is usually done to install pirated games and apps for free but this makes it easier for spyware to operate on your device.

4. Be cautious when choosing and installing apps

It’s a vast universe out there in the World Wide Web and, at times, it’s hard to tell the good guys from the bad ones. It therefore pays to be extra careful when downloading apps from the Internet. If something is too good to be true, it probably is. Do background checks on developers if you need to be sure, and scrutinise an app’s ratings and reviews as well.

It’s also a better idea to download apps directly from the Google Play Store for Android devices rather than from third party websites since downloads from some of these sources may contain malware.

Do have a close look at the Terms and Conditions as well as permissions requested by an app prior to installing it, as you don’t want to unknowingly allow developers to track and collect personal data which is unnecessary for running the app.

5. Scrutinise notifications and services running on your device 

Stay alert whenever you receive any notification on your device. Some may contain malicious links or cleverly trick you into submitting personal information to cybercriminals.

Also, pay special attention to services running in the background on your device that seem unfamiliar or strange. You will have to refer to online guides on how to check, as it differs among devices.

The principle of “when in doubt, throw it out” could help save you a great deal of trouble later on.

6. Log out immediately

This is especially crucial for social media apps where the chances of your data being misused are higher. Make it a habit to log out of such apps and re-enter login information each time you use them.

7. Stay up-to-date

Take time to pick out a preferred mobile security software and install it on your device. Make sure to constantly update it, and don’t forget to check for updates for all your apps and to install any available patches for your device’s operating system as well. Set up routine scans for your device, and review the logs each time a scan is concluded.