Connect with us

Intelligence

The Afghan intelligence services

Published

on

Still today the Afghan Intelligence Services’ ability to collect information is definitively scarce. This is mainly due to the limited specific training of staff and the very scarce and even improper use of the most recent technologies.

The Afghan Intelligence Services collect information mainly in major cities and in the areas most controlled by the government and this often leads the decision-makers who use this “complacent” or rhetorical intelligence to make severe evaluation errors.

The National Directorate of Security (NDS) does not correctly disseminate its news in the traditional “information cycle” of a Service and therefore it leaves decision-makers with scarce, incomplete and often inaccurate information. Established in 2001 and heavily supported by the United States, the NDS is based in Kabul but is strongly supported by Germany, GBritain and obviously the United States. It should be noted that its first Director was Mohammed Arif Sarwari, one of the leaders of the United Islamic Front for the Salvation of Afghanistan, i.e. the old “Northern Alliance”.

 It was precisely the NDS that in 2015 caused the fall of Kunduz into the hands of the Taliban, who were, indeed, a full invention of the Pakistani Intelligence Services, which were in search of an Afghanistan that could only play the role of “depth area” for a possible nuclear or even conventional confrontation with India. Ironically, it is from the Pakistani Intelligence Services that the United States received the largest or almost total amount of news and information precisely, or apparently, against the Taliban. Quos Deus lose vult, dementat.

 Moreover, the current relations between the NDS, the National Security Agency of Afghanistan (NSA), i.e. another Intelligence Service in Kabul, the Defence Ministry and the Interior Ministry show a very poor ability of communication and exchange of news between them, which makes them often be late in their operations or even useless.

 Or sometimes voluntary collaborators of what Westerners would call the “enemy”, but for some operatives or executives of the NDS or of the other Afghan Intelligence Services could also be an “Islamic brother”. Sometimes it has happened.

 In the case of Kunduz, the very evident and aggressive Taliban operations were deemed ineffective or irrelevant. Nobody took seriously the news coming from the most reliable “sources” among the rebels. No agency of the Afghan Service took seriously or even studied the Taliban operations in Kunduz.

 The NDS, however, was established mainly with the support of the American CIA.

 But there is a strategic and conceptual problem that should not be overlooked at all: all NATO countries that participated or still participate in military operations in Afghanistan have very different ideas about their role in the war against the “rebels” and in the country.

 The Resolute Support Mission, composed of about 13,000-16,000 soldiers from 39 NATO countries and from other countries, operates from Kabul, Mazar-i-Sharif, Herat, Kandahar and Laghman, and focuses mainly on the training of Afghan forces, as well as on military consultancy and assistance, hoping that the local Afghan forces will reach a level capable of ensuring at least fictitious national independence.

At least until 2014, akey year for the new relationship between NATO and the Afghan government, the Italians – who are still training the Afghan police very well – went there especially not to displease the usual U.S. Big Father that the Italian strategic system still sees as unquestionable and unassailable.

This participation “to bring democracy” has led to some positive effects for Italy, especially on the technological-intelligence level. But it has never been enough.

Nevertheless, the silly servility and sycophancy of Italian politicians, who closely resemble the character of Nando Mericoni played by Alberto Sordi in the movie An American in Rome, is still largely widespread. Italian politicians – even starting from the text of the Constitution – do not know or do not want to understand the eternal rules of foreign policy and strategic thinking, of which they know nothing yet.

Certainly you cannot obtain votes, additional funding and small favours from foreign policy. This is the level of Italian politicians, especially in current times more than in the past.

 France, as long as it stayed in Afghanistan, interpreted its presence in Kabul as a way to control Asia’s intermediate axis so as to avoid Indian, Pakistani, Chinese, Iranian and even American expansion.

The Brits went to Afghanistan to fight against a “terrorism” of which – like everyone in the West-they do not know the organizational and doctrinal roots or even the purposes, but see as the maximum destabilization of their unreasonably “multi-ethnic” and hence inevitably “multipolitical” societies.

 This is the terrible case of a propaganda that stifles even the ruling classes that should be immune to it.

Certainly this was not even true in Afghanistan because the bad guy, namely Osama bin Laden, was often elsewhere. He was considered the only mastermind of the aforementioned “radical Islamic terrorism” – or whatever can be defined with this rather rough terminology – and hence to be killed, like a horse thief in the Far West. As has precisely happened, the killing of Osama bin Laden did not change anything.

He had to be killed because he had killed American citizens. True, right. But foreign policy is never the extension of any country’s domestic criminal law.

 There was even Germany present in Afghanistan to contemplate its military decline, but above all to show – even eighty years later – that it was no longer a Nazi country. As Marx would have said, le mort saisit le vif.

In short, the varied presence of NATO and of the initial coalitions of the willing in the War on Terror had no clear ideas and probably did not even know where it really was.

Meanwhile, since 2014 – the year of the actual withdrawal from Afghanistan by the United States and its attack forces (after rigged elections, but in any case, whenever the United States participate in operations abroad, it always has acoitus interruptus)– the Taliban have started their great and real campaign to conquer the territory and, above all, the Afghan “souls”.

 In 2015 NATO and the United States had planned to keep 13,000 military plus 9,800 U.S. soldiers for counter-terrorism activities. Later, however, the withdrawal from the Afghan territory – coincidentally after the great Battle for Kunduz – ended in December 2016, but leaving alive and operational as many as 8,400 soldiers on the ground.

Currently as in the past, the real problem for Afghanistan is Pakistan. General Musharraf, the former Pakistani President from June 20, 2001 to 18 August 18, 2008 (note the dates) and perpetrator of the 1999 military coup, clearly stated that the Inter Service Intelligence (ISI), i.e. the Pakistan single intelligence structure, supported and trained all terrorist groups in Pakistan so as to later send them to Afghanistan, with a view to carrying out “terrorist” attacks on NATO, Western and Afghan targets.

 In 2015 -a key year for Afghanistan – in an interview with The Guardian, Musharraf clearly said that the ISI had always “cultivated” the Taliban mainly to destabilize the government led by Karzai (a man also linked to India) but, in particular, to carry out harsh actions against India.

Pakistan keeps on supporting terrorist groups operating in Afghanistan and in other parts of the world – not only the Taliban, but also the other groups.

Rahmatullah Nabil, the Chief of the NDS -i.e. the new Intelligence Service affiliated to CIA but entirely Afghan – also officially showed documents proving that the funds long granted by the United States to Pakistan to “fight terrorism” shifted to the Pakistani Service ISI, precisely to train, recruit and support terrorism.

Hence the forgetfulness – so to speak – of the Afghan governments with regard to intelligence comes from far away.

 At the time of the Soviet invasion, the KGB and the GRU created their two local counterparts, namely the Khadamar e-Aetela’at Al-Dawlati (KHaD) and the Wazeelat e-Amniat-e-Daulati (WAD), respectively.

 The two agencies disappeared when Najibullah’s government fell in 1992, pending the great Russian crisis. As a result, however, also the Afghan State in all its forms collapsed. Therefore also the two agencies linked to the Soviet intelligence Services evaporated.

What there was, anyway, in the Afghan Intelligence Services before the Soviet invasion?

 The first governments that had just come to power, after Russia’s arrival, organized four agencies: Kargarano Amniyati Mu’asasa (KAM), i.e. the “Workers’ Intelligence Service”;Da Afghanistan da Gato de Satalo Adara (AGDA), i.e. the “Agency for Safeguarding Afghan Interests”, Amin’s real longa manus, and the aforementioned WAD and KhAD.

The President of the time, Noor Tarakai, had little power, while Hafizullah Amin made sure that both the Communist Party (or, more precisely, the Afghan People’s Democratic Party) and the Agencies were divided in two, always following the policy line of the Khalq and Parcham factions.

 The Khalq (meaning “masses” or “people”) was directly supported by the USSR. It was largely made up of Pashtuns and was particularly popular among the working classes.

The very superficial Marxism shown by the faction was often only a way to defend the Pashto world from the pressures of other ethnic groups.

The Parcham (meaning “flag”) was the most widespread faction of the party in the urban classes and in the middle and upper classes.

 Eternal separation between rural and urban areas, a typically Maoist and classic crux of every practical and extra-Western interpretation of Marxism-Leninism.

The Parcham reunited laboriously with the Khalq faction during the 1978 Revolution, but it really came to power only after the Soviet operation, the local coup, i.e. Operation Tempest 333 of December 27, 1979, when the Alpha divisions of the KGB quickly took the Tajbeg palace and assassinated Hafizullah Amin.

 Meanwhile, it was Amin himself who had ordered the assassination of his predecessor, Mohammed Taraki.

 In the intermediate phase of his regime, Amin also had many Afghans assassinated – and not only his known opponents.

 A possible, future “Cambodian” twist of Afghan Communism? Probably so.

 At that juncture the USSR intervened since it did not want ideological deviations or Afghan approaches to Chinese Communism, as practiced in Vietnam or, precisely, in Khmer Rouge’s Cambodia. Hence Operation Shtorm 333 was carried out which, apart from Amin’s assassination, lasted approximately three months, to definitively “settle” the remaining issues.

With specific reference to the Afghan intelligence services, Hafizullah Amin mainly used the AGSA, but also the KAM, only to settle his scores. The two agencies, however, received technical assistance and training from East Germany and the USSR.

Nevertheless, the shift between the different ethnic groups is precisely the key to understanding the Afghan intelligence services prior to the U.S. and NATO operations. I believe that, in any case, ethnic factionalism – probably dating back to the old political-tribal faith – was the key to the functioning of the new Afghan Intelligence Services, even during the naive Western administration.

 In January 1980 the KHaD fully replaced the KAM.

Furthermore, the KHaD was placed outside the administration of the Interior Ministry, dominated by the Khalq and then immediately transferred to the office of the Prime Minister, who later also became National Security Minister.

 The Directors of the Afghan Intelligence Services always reported directly to the KGB and, in 1987, the standard situation was that the Afghan Intelligence Service employed almost 30,000 operatives and officials and over 100,000 paid informants.

 Each element of the Afghan Intelligence Service had at least one KGB “advisor” behind them. As also shown in Syria, Russia paid but did not trust it too much.

 Between 1983 and 1993, the Pakistani Intelligence Service ISI -established by a British officer – trained, with the support of CIA, almost 90,000 Mujahideen to send them fighting the USSR in Afghanistan.

 The KHaD had also the statutory obligation to “defend the Communist regime” and “unite all Afghan ethnic groups under one single political system”, especially in collaboration with the Ministry of Borders and Tribal Affairs.

 Again in the 1980s, the KHaD always had both East German and Soviet instructors and numerous secret mass executions took place.

 About 60,000 Afghans were sent to the USSR between 1980 and 1984.

Again in those years, as many as 10,000 KHaD officers received special training from the KGB.

In an old confidential document, CIA also estimated that the total cost of the Soviet engagement in Afghanistan was over 15 billion roubles, plus additional 3 billion roubles for the period when it did not directly occupy Kabul.

 Since currently the 1979 rouble is still worth 22.26 Euros, in principle we can calculate a Russian occupation expenditure of 233 billion and 930 million, plus the extra three billion roubles.

 The KHaD also created tribal militias on the borders, while the KGB organized the internal tribes on its own, mainly for sabotage and to spread dezinformatsjia.

After the USSR’s final collapse and the arrival of the United States, however, a new Afghan Service, the NDS, was immediately created.

It was made up mainly of former KHaD agents and Mujahideen. Indeed, there was no other population available.

The Service, however, was known to be bad or even very bad: its operatives and analysts were selected only on a tribal level or by simple political affiliation.

 They never went to school for education and training. They had no serious training centres and they did not professionally check their networks of informants.

 Even the United States, however, spent a lot of money in Afghanistan: the Congressional Research Office has calculated a 1.6 trillion dollar spending in Afghanistan and Iraq only for the “War on Terror”.

 The Afghan Service costs the USA 6.4 billion dollars every two years.

 And spending always tends to increase, regardless of the poor results reached.

 What about China? First of all, China wants the political stability of Afghanistan, which is a neighbouring and Islamic country. In particular, it controls Kabul to prevent Uyghur jihadism from finding a safe and secure place there. It prevents the Uyghurs from having contacts with the Taliban. It has already happened.

 Everything will happen when the United States definitively leaves Afghanistan, since China now regards that country as an essential pawn in its relationship with India, while – through Pakistan – China strengthens its relations with the Taliban, which the Chinese view as the next and inevitable masters of Kabul. This forecast is really easy to make.

 Moreover, China provided 70 million per year to the Afghan government to support its counter-terrorism efforts, while there have long been Chinese soldiers in Badakhstan and, above all, in the Wakhan Corridor, where it is said that China has already created a military base and has even already deployed a brigade of the People’s Liberation Army.

 China has also put pressures on Kabul for Afghanistan to accept its satellite positioning system, instead of the GPS developed and managed by the United States.

Some Chinese troops, however, have also been stationing in Tajikistan for long time, again to protect the Wakhan Corridor.

Since his rise to power in 2014, however, also Ashraf Ghanihas thought to immediately improve his relations with China so as to use, first of all, China’s influence on Pakistan to avoid the Pakistani support to the Taliban – which is unlikely – as well as ensure that China begins to invest significantly in Afghanistan, now that the civil and international war is on the wane.

 The China-Pakistan Corridor, one of the first axes of the Chinese Belt & Road Initiative, is now worth 62 billion U.S. dollars of costs alone.

 There is also a new railway line leaving from the port of Gwadar, the axis of China’s projection, and arriving in the Pakistani province of Baluchistan and beyond.

In 2016 China also signed an agreement with Afghanistan for the Belt & Road Initiative, with the promise of 100 million U.S. dollars for infrastructure projects in Afghanistan, which have not been provided yet.

 Trade between Afghanistan and China is fully asymmetric and, until Afghanistan is completely pacified – certainly by others and not by China -we believe that that the issue will not be very relevant, at least for China.

 And until the triangulation between the Taliban, Pakistan and China – which has still many doubts about the reliability of the Pakistani “students” operating in Afghanistan (precisely, the Taliban) -is not even clear, the Afghan economic revival – if at China’s expense – will be slow or unlikely.

Advisory Board Co-chair Honoris Causa Professor Giancarlo Elia Valori is an eminent Italian economist and businessman. He holds prestigious academic distinctions and national orders. Mr. Valori has lectured on international affairs and economics at the world’s leading universities such as Peking University, the Hebrew University of Jerusalem and the Yeshiva University in New York. He currently chairs “International World Group”, he is also the honorary president of Huawei Italy, economic adviser to the Chinese giant HNA Group. In 1992 he was appointed Officier de la Légion d’Honneur de la République Francaise, with this motivation: “A man who can see across borders to understand the world” and in 2002 he received the title “Honorable” of the Académie des Sciences de l’Institut de France. “

Intelligence

Al-Qaeda, ISIS, Taliban and the Modus Operandi of Jihadi Terrorism in Africa

Published

on

According to sources, the violence in the Southern African country of Mozambique is on the rise and there is a possibility that the war could spread from Mozambique to (South Africa) as well as Zimbabwe and Botswana.

In addition, Islamic militants in Mozambique want to establish ties with other foreign Islamic militants, Mozambique’s al-Shabab militant group has traveled to Somalia to establish ties with the al-Shabab Islamist group.

To strengthen the group, smugglers from Tanzania also smuggle weapons into the area, and villages in Mozambique near the border between Tanzania and Mozambique have been burned to the ground to spread terror. And young people from South Africa are also flocking to Mozambique to join al-Shabab and ISIS.

 In addition, ISIS fighters from the Democratic Republic of Congo have been sent to Mozambique. According to sources, the global heroin market has heated up with the advent of the Taliban government in Afghanistan, and heroin is smuggled from Afghanistan to Mozambique and from Mozambique to South Africa, where it is used to smuggle drugs and gems into Europe and the United States.

According to source, the visit of the Taliban representative showed that the Taliban wanted to strengthen ties with Al Shabaab in Somalia, But Hazrat Musa was originally meeting with insurgents who smuggled drugs from Afghanistan to North Mozambique and then from northern Mozambique to South Africa, where most of the heroin was smuggled, then smuggled to Europe and America.

According to an accurate report, the Taliban from Afghanistan, through members of Haji Bashar’s family, established links with al-Shabab in Mozambique, Because Haji Bashar’s cousins ​​and Haji Bashar’s own family members are involved with all the international smugglers and terrorist groups. Russian weapons and Afghan heroin reach North Mozambique via Iran to North Mozambique and then on to South Africa and some of the Heroin are given to Islamic militants in the Democratic Republic of Congo for Gold and diamonds, to use them on young children to destroy their minds.

ISIS leader in Congo Sika Musa Bluko and ISIS leader and activist Abu Yasser in Mozambique have partnered with Haji Bashar, a former Taliban financier in Afghanistan, to smuggle heroin and human organs, The two are still linked to key Taliban leaders. Abdul Rahman Shah Agha from the Taliban, a resident of Kandahar province and with members of Haji Bashar’s family smuggled heroin from Maiwand district to Iran, And Ahmad Reza, a notorious smuggler, smuggled heroin and weapons from Iran to northern Mozambique, From there, Musa and Abu Yathir are responsible for all the heroin and weapons.

Fighting has intensified in Mozambique since the Ukrainian invasion, and Iran has stepped up arms smuggling from Afghanistan, in addition to drug trafficking, in exchange for gems, gold and cash. To this end, the process of distributing weapons to young people in South Africa has been intensified so that they can fight in Mozambique and South Africa on the pretext of religion and ethnicity.

According to sources, the ISIS group fighting in Syria is also in contact with Ansar al-Sunnah and Madinat al-Tawhid wal-Mujahideen in Africa. Large quantities of weapons from Syria also reach these areas to intensify the war, and private traders take advantage of this situation to smuggle precious stones from Africa and then sell them legally, Not only the businessmen but also the army chiefs in the area are involved in making a lot of money. Mozambique’s military is in a crisis, and innocent South African children are being killed in religious and ethnic wars.

Disclaimer: The views expressed within Modern Diplomacy are solely those of the authors in their private capacity and do not in any way represent or reflect the views of the Modern Diplomacy, its Advisory and Editorial Boards, Sponsors, Partners, or Affiliates.

Continue Reading

Intelligence

The penetration tactics of the CIA and the Israeli Mossad and the Chinese experience

Published

on

What occupied me the most during the last period after the control of the American Central Intelligence Agency and the Israeli Mossad on a number of those around me, including: professors, colleagues and relatives, was to spread the story of my madness everywhere, despite my severe isolation from everyone, due to my strict academic and analytical intelligence nature, which completely compels me to move away about all aspects of luxury or racing to get to know others for purely security reasons, related to my personal safety, for being targeted by the Israeli Mossad and the American Central Intelligence for many years, which made me very sorry, for the decline of morals of some, and their selling of their conscience and morals at any price for a few pounds will end  It is implemented quickly, but it has caused harm to a person who was looking for restoring the dignity and prestige of the Arabs and helping them dismantle all the American and Israeli spy networks in the Middle East and the region, as well as preparing new generations capable of challenging and imposing and dictating their conditions on everyone with strictness and firmness. But, in the midst of this struggle, I was shocked by the morals of many around me, who sold and betrayed at a cheap price.

   Therefore, the previous period was one of the most important periods of my entire life, for my intellectual work and my intelligence analytical efforts as a proactive intelligence analyst, and a future theorist that draws the shape of the foreseeable future and maps of the modern world, and reshapes the alliances of the new world, after the disintegration of the features of American and Israeli hegemony, with the rise of other great, regional and international powers, such as: China and others, to help all Arabs and developing peoples to fully challenge American hegemony, and their constant attempt to impose their conditions on us, and even formal plans to encourage Arabs and the sons of Arab and developing peoples to penetrate the American depth itself, by ending that American hegemony over them, by dismantling all of the American espionage networks in Egypt, the region and even the world, with entering the depth of the American Central Intelligence Agency and wandering in the building of the Israeli Mossad, to obtain all the information we want to know, enabling us to challenge America as a superpower and force it to submit to our conditions and dictate our conditions to it and to the Israelis themselves, after dismantling the Israeli Mossad device itself from the inside after its penetration.

  Through my diligent observations, and my psychological and psychological studies of the mentalities and personalities of a number of American and Israeli diplomats, and my search for any previous recorded conversations of American and Israeli intelligence men, I noticed very carefully the extent of the state of confusion and disrespect for the policies of their countries, and their severe prejudice against them, which caught me in the eye of an intelligence expert examining the entire situation. I came to a genius conclusion, according to which the easiest personalities to recruit at any price are American and Israeli diplomats and their military and general intelligence men, given the nature of the pressures and the enormous suffering they face, as well as their complete dissatisfaction with the policies of their countries and their intelligence services with their current formations. This is perhaps what I played during the last period, by following up on all the activities of the American and Israeli diplomats that I reached, and my strict follow-up to everything that falls under my eyes in terms of conversations by their intelligence men to analyze the strengths and weaknesses of their personalities, and to write and record that on an ongoing basis, to identify the most prominent commonalities between them, tracking and knowing those individual differences, which enabled their intelligence and diplomatic services to seek help from them during previous periods.  It reached a maximum result, which is the possibility of completely subjugating all American and Israeli diplomats and their intelligence men in favor of other intelligence services, who are hostile, proud and admirable at the same time, as they view China and Russia, their archenemy.  Hence, I set out to draw the features of the approach and decipher the symbols and codes of the relationship between them and their current intelligence services, from intermittent communication or complete separation, followed by a defining stage of indifference or ignoring the question.  Because through that particular detail and detail, I can penetrate into their depths intelligence, security and psychologically, and then ensure control over them, just as they do with me and those around me, to ensure control over me, considering that I am one of the most prominent proactive intelligence analytical mindsets in the world, as well as my frightening personality for them  To my closeness to the countries of China and Russia and their friends alike.

 By analogy with the previous point about the possibility of recruiting their intelligence men and diplomats and subjecting them to our conditions – which I tried to draw the attention of the countries of China and Russia to – China has succeeded in achieving an unprecedented penetration of the files of all American and Israeli diplomats and intelligence men alike.  The Chinese helped in this, and their absolute and unparalleled success in penetrating the depth of files belonging to the Israeli Mossad and all its employees or dealers, which led to the disclosure of the data of tens of thousands of Mossad employees, the Shin Bet security service, the Israeli Atomic Energy Commission, and the Israeli Institute  For biological research, the Israeli military forces, which include: the names of the most prominent pilots, intelligence personnel, members of the special forces, and nuclear scientists in Israel. Israel fears that many parties will benefit from this information, such as: Iranian intelligence, Hezbollah in Lebanon, as well as many other intelligence agencies, which do not maintain friendly relations with Israel.

  The Chinese and Russian intelligence are constantly trying to obtain all the information, documents, documents and speeches delivered at all Israeli conferences, or in which Israel was an original party or a participant.  Where the most serious issue for the Israelis is related to the readiness of the Arab armies and defense ministries at the present time, to form a “joint military defense alliance between Israel and the Arabs to fight Iran”, which I tried to draw the attention of the Chinese to, and resulted in China forming a multilateral action platform to bring about a kind of dialogue and rapprochement between the Arab Gulf and Iran, away from the policies of Israeli and American provocation, and their tireless attempt to ignite and inflame the situation in the region against Iran as an ally of China and Russia, in favor of Israeli rapprochement with the Gulf states and all.

  The Mossad, and other Israeli intelligence and security services, rely on these data, which are owned by the (Israeli Ministry of Interior), in order to recruit new members, whether inside or outside Israel itself.  The Israeli intelligence, especially the Mossad, is also working on using false or pseudonymous identities to carry out all its security operations, whether it is to carry out surveillance and gather information, to infiltrate certain places, or to purchase sensitive equipment.

  The leaking of such information to China or others is disastrous for the Israeli intelligence and the Mossad, because this leads to the possibility of linking it to activities that take place abroad under false Israeli or foreign identities.  It is also possible that the leakage of that sensitive information that China has penetrated may lead to thwarting many Israeli security operations abroad or lead to the arrest of Mossad agents through foreign intelligence agencies. Above all, by verifying these leaked Israeli intelligence data, it is possible to ascertain the living persons and the deceased personalities whose identities are used by the Israeli Mossad in secret missions to conceal the true identity of the Israeli agent entrusted with carrying out a mission.

  What is most important to me is China’s follow-up and targeting of all activities and operations of the Israeli Mossad and its close follow-up of all Arab students studying in the defense and military industries abroad, and its follow-up by the Israeli Mossad elements since their first university studies, until the start of their graduation and the end of their studies and then their travel to their homelands.  This is what China has learned well through many of its collaborators from countries and individuals, to obtain a lot of sensitive information that the Israeli Mossad elements are trying to access and identify, then turn it into several intelligence reports in files, and track Mossad agents responsible for following up on defense industry students and researchers.  And the discussion of their relationship with Mossad officials in several countries other than the Israeli territory itself abroad, and China’s tireless attempt to dismantle all the Israeli encryption programs on the Internet, which Israel uses to communicate with clients, which is shocking to the Israeli Mossad, which is considered an “intelligence earthquake” for Israel.

  The point of intelligence worth mentioning to China and the region remains, which is confirmed by all the intelligence documents recently obtained by China, that there is a clear fluctuation in the positions of the leaders of the Arab armies and defense ministries during their speeches at the joint security and military conferences between them, and within the headquarters of the League of Arab States, on the  Those Arab armies are still far from being ready and ready to fight any war or joint conflict with Israel against Iran.  These analyzes or summaries of closed secret discussions of the leaders of the Arab armies and defense ministries regarding their position on the joint military and defense alliances to confront Tehran’s moves in cooperation with the military leaders in Tel Aviv, are considered the biggest strategic treasure for China, Russia and Iran alike, which is probably what the Mossad leaders realized  The Israelis, who are known to report directly to the Office of the Prime Minister’s Office in person, have provided the high political level in Israel with valuable information about the lack of readiness of the Arab and Gulf armies for a military confrontation with Israel against Iran.                  

  On the other hand, after the success of Chinese intelligence in completely dismantling all American spy networks on Chinese territory, doubt arose about China’s success in recruiting diplomats from the American embassy in Beijing to work for it, and the suspicion of American intelligence appeared in everyone, including the American ambassador at the American embassy in Beijing  same.  Which prompted all American intelligence agencies, to form (special working groups of the elite and elite of American intelligence, the most experienced and the highest ranked, whether within the FBI or the CIA)                               

FBI & CIA

  They assigned this group a very secret headquarters that they chose meticulously in northern Virginia, and assigned it to analyze every operation, and to (study the file of all diplomats working in the American embassy in Beijing very carefully, regardless of their diplomatic ranks, including the American ambassador himself, for fear of  recruiting them for China).                                                          

  This is what Chinese intelligence has succeeded in completely, given the targeting of US and Israeli Foreign Ministry officials by the Chinese, and the most dangerous targeting of China to recruit senior American and Israeli security, military and intelligence ranks and leaders on behalf of the Chinese Ministry of State Security, which is the main intelligence agency for China.  They are assisted by all the vast Chinese spy networks spread around the world, in view of the directives issued by the Chinese President, Comrade Xi Jinping in 2018, and his strict directives to Chinese companies to amend their internal regulations to put the concepts of (loyalty and belonging to the Chinese state above achieving economic profit itself). The largest and most dangerous role remains, represented by the (Chinese Ministry of State Security) in Beijing, through its recruitment of the former officer in the US Central Intelligence Agency “CIA”, named “Jerry Chun Shing”, and through him the Chinese intelligence was able to know and track all the lists of the agents he knows are CIA agents, and the most dangerous is the help of former CIA officer “Jerry Chun Shing” of Chinese intelligence in deciphering the encrypted communications system known as “Quafcom” to set up the entire American spy network in China.                                                                

  The most dangerous Chinese intelligence service is the (Chinese Ministry of State Security), and the Chinese Ministry of State Security begins to monitor and recruit its officers from the first university level, as most of them come from students of the (Beijing University of International Relations), and this is the main difference in the Chinese approach to recruiting intelligence officers. In their first university stages, in order to select the best qualified in a precise and strict manner, and to have better opportunities in examining their backgrounds and their contacts with foreign bodies, and do they have a history of traveling or residing abroad or not?  The Chinese Ministry of State Security also places great emphasis on the proficiency of its employees in foreign languages, and runs an “intensive school for teaching foreign languages ​​for officers”, in addition to placing them for a long time under the supervision of a special department of internal security known as (the Ninth Office), whose main function is (monitoring and following up all  Workers and conscripts within the Chinese Ministry of State Security).                                                                                

                                                                                   It comes at the top of the government agencies that practice intelligence activity informally in China, namely: (The National Defense Administration of Science, Technology and Industry), known in China and internationally as the “Sustained Administration”, and it is very similar to the work of the (Defense Advanced Research Projects Agency), known as “DARPA” in the United States of America, and we find the role of the Chinese news agency “Xinhua”, which Washington and the West always accuse of working as a cover for Chinese intelligence officers and agents, and which prepares secret summaries for decision-makers in Beijing, and there is also (the Office of Overseas Chinese Affairs), which maintains relations with overseas Chinese communities and Chinese expatriates, as well as the role of the (Chinese Ministry of Education), which monitors and communicates with all overseas Chinese students, all of these Chinese bodies, ministries and agencies employ their followers to collect information for the benefit of the Chinese government.                                                       

 The main office responsible for recruiting and screening the handpicked in China for espionage activities is (the Liaison Office of the Ministry of State Security in Fuzhou, China). Whereas its elements are spreading all over the world in a decentralized network run by the principal officers.

 In general and statistically close to accuracy, the number of Chinese elements loyal to the Chinese state security apparatus within the United States of America alone can be estimated at hundreds of thousands of individuals or assets, some of whom work permanently and others temporarily, and there are statistics confirming that there are more than 17 million Americans of assets.  Asian, including four million of Chinese origin, in addition to a huge network of shell companies and front companies, numbering nearly three thousand… All of them are directly affiliated and are under the supervision of the Chinese Ministry of State Security.

  Chinese intelligence methods vary in recruiting these elements, but in the case of precious assets, that is, those that provide intelligence information of high importance to China, many additional temptations and advantages are often added to them, and some of them are called “ocean bottom fish”, a Chinese equivalent term  For the concept of “sleeper cells” in Western intelligence culture, these fish often receive training up to several months or years inside China, and are mainly used in the process of gathering information and filling gaps in communication networks, and sometimes to spread rumors in their host country. The Chinese intelligence has retained its special and distinctive character of the huge number and widespread espionage operations whose effects are felt all over the world.

   Here, we are noticing the extent of the sophistication and advanced of the Chinese intelligence services, which consists of a wide range of intelligence agencies, military departments, corporate offices, party organs, and even research institutions, universities and the media, all of whom are subject to two parallel structures of control, whether by the central government in Beijing, or by  Before the intelligence services of the ruling Communist Party in China, whose institutions hold the actual power in the country at the expense of the government itself, and carry out various operational and administrative tasks.

  And the most dangerous office of the CIA targeted by Chinese intelligence is the (Office of Foreign Broadcasting Information Service), which includes a complete list of sensitive information from the heart of the CIA, which is passed on to Beijing, and perhaps the most important is information related to the plans of the CIA. The White House and its management of rapprochement or conflict with China, plans whose leakage gave Beijing a higher position in any subsequent negotiations with the American side.

 The surprising thing for me, personally, is the prohibition of visiting China for all its recruited agents who are implanted within the American Central Intelligence Agency in particular, since the beginning of their work in the American Central Intelligence Agency, provided that the meetings of Chinese recruits within the American intelligence services take place with the Chinese agents operating them to give them  The orders are in other countries apart from China and Washington, knowing that the duration of those meetings takes only a few minutes at most, due to the difficulty of monitoring and tracking them during those few minutes and seconds, and most importantly, the Chinese intelligence agents follow up with the American agencies their assignments that reach them from China with one Chinese intelligence official that does not change, in the manner that he may remain with his agents for a full 30 years, in order to maintain secure, narrow, and unobservable channels of communication by the Americans except with great difficulty.

  In general, the Ministry of State Security of China, which is the main Chinese intelligence service, was established in 1983, by merging the (Central Investigation Department with the espionage units of the Ministry of Public Security), to eventually turn the ministry into China’s main civil intelligence service, under it, they are organizing all the official and unofficial intelligence structures in the country, with the exception of the army, which maintained its own military intelligence apparatus, which is under the supervision of the Communist Party of China, and not under the direct control of the government.

 The Chinese President, Comrade “Xi Jinping”, directed his intelligence services to stop using embassy employees for espionage purposes, and to rely instead on journalists and businessmen, as part of a grand strategy known as “hide the brightness and feed the mystery”, where “Xi Jinping” wanted to expand the capabilities of his country, however, wanted to keep pace with the West, without engaging in many rhetorical wars and as covertly as possible.

  Here, we find the distinctive nature of the Chinese intelligence work, which depends not only on recruiting influential agents to obtain direct and sensitive information, as much as it depends on flooding the enemy intelligence and counterintelligence services and the enemy with thousands of small-scale and scope espionage operations, many of which seem to be of no value. The final total results of those Chinese slow and complex processes is often  reflect the traditional human traits of the Chinese who are known for their patience, perseverance and hard work.

  We can understand this Chinese way of tiny and small group work to obtain information, in Chinese social norms, and specifically in the well-known Chinese “Guansky” tradition, which means exploiting slow and strong interpersonal networks to influence events, a norm that has been developed and transmitted to Chinese business and economy, and later to the field of intelligence at the structural and technical level, at a time when the intelligence industry and the war of minds and information gathering were at a rapid pace for China, given the density of the intelligence working groups of the Chinese.

  The culture of intelligence and information gathering has gained tremendous importance for the Chinese, and their special approach to obtaining information, which has always been far from the general logic and bearing its own mark, was often done through a combination of (three main ways), which are:

  1. The first way: is what is known as human waves, where they exploit  Beijing has its huge human assets to recruit thousands of Chinese to collect huge amounts of information.
  • The second way: is to recruit and rely on the services of millions of Chinese people in all countries of the world and extract information from them periodically to reach deeper levels of network analysis of the huge data acquired.
  • The third way: It is slowly and patiently cultivating foreign agents in order to conduct active espionage operations in the long term.

  Through my intelligence analysis referred to, we can understand that Chinese espionage operations on the American side have made a great resonance in the American intelligence community, and shed light not only on the continuous rounds of the secret intelligence conflict between China and the United States of America, whose chapters still extend to this day, but also on the unfamiliar traditions and tactics of the Chinese intelligence services, one of the most efficient and complex intelligence services in the world, and perhaps the least known, notorious, knowledgeable and unfamiliar with their complex working methods.                

Continue Reading

Intelligence

Chinese penetration and its destruction of all American spy networks on the Chinese territory

Published

on

China’s National Counterintelligence and Surveillance Networks and the China Foreign Counterespionage Bureau have succeeded in dismantling all US spy networks on all Chinese territory.  The amazing thing is that the Chinese surrounded all American CIA officers and informants, who were going to Chinese restaurants to meet their clients, and the network of American spies in China, which turned out to be all under the control of the Chinese secret services. Every restaurant in China, according to what was announced by the secret reports of the American intelligence, and frustrating is the work of these workers in Chinese restaurants, and their possession of different military and security ranks in the (Chinese National Counterintelligence Service).

  Which prompted the Central Intelligence Agency to withdraw and smuggle many agents, informants and spies for America from China since 2010 until now due to its losses there and the vigilance of the Chinese. Which caused the CIA to suffer terrible losses as a result of this great failure it suffered in penetrating deep into the Chinese territory itself.  Perhaps this is what brings me back to the memory of what happened completely similar to it, given what the CIA also incurred in the Soviet Union, after the detection of many American agents inside Soviet lands.  The terrible shock was that the real reason for the detection of American agents on Soviet soil was betrayal from within the CIA itself, as American spies were handed over to their Soviet hunters by the American FBI agent (Robert Hansen), the head of the same counter-intelligence unit in the CIA, whose name is (Aldrich Ames), who were recruited by the Russian Intelligence Agency “KGB”.

 The fearsome Soviet in the seventies and eighties and throughout the Cold War period between the American and Soviet parties.

 Here, the reason for the Chinese intelligence dismantling all American spy networks on Chinese soil is due to the (Chinese anti-espionage service) being able to uncover a modern surveillance system, organized by the (US National Security Agency) “NSA” from Taiwan. At first, CIA agents went to the American student in Shanghai, China, “Glenn Shriver”, who collected American information of a defensive nature for Chinese intelligence in order to earn money to inspire American students studying abroad and motivate their patriotism, the (US Federal Bureau of Investigation) “FBI” issued (A video exposes the betrayal of the American student “Glenn Shriver”).

 And cases of real Chinese hacking of American intelligence were discovered, including what happened in March 2017, when the employee of the US State Department, “Candice Clinburn”, was arrested after discovering that she had secret contacts with Chinese officials, and her bank account revealed the scandal of the flow of money to her from China, in addition to  Chinese officials showered her with precious gifts and drenched her with money, including: an iPhone, a laptop computer, a fully furnished apartment, and many other benefits. But “Clinburn” did not admit her mistake, and no one could prove that she had revealed information about American agents to the Chinese.

  In another discovered case of Chinese spying on Washington, in January 2018, “Jerry Chun Xin Li” 53-year-old, was arrested at New York airport.  We find here that “Jerry Chun Xin Li” is an American citizen of Chinese descent who served in the US armed forces in the 1980s, and since 1994 has worked for the Central Intelligence Agency, where he had access to highly classified documents.  In 2007, he retired and went with his family to “Hong Kong”, and there he worked in an auction house, belonging to a high-ranking official in the Communist Party of China, and he was identified and recruited for China in the face of the CIA.

  In addition, the US secret communications system, used in China, known as:

“Covcom”

  What was used by a network of American agents in China, was very primitive, and the most dangerous was that it was connected via the Internet, and it was very similar to the American intelligence communication system in the Middle East, where the network environment is less dangerous.  It is clear that the American intelligence geniuses did not fully appreciate the capabilities of the Chinese hackers and hackers.  And when the American investigation team conducted tests to track the Chinese intrusion, it found that the American system of communications with the network of agents and spies in China contains a fatal error, as once it is entered, it is easily possible to access a much wider secret communication system, as the CIA was using it and interacting through it with its agents and agents network all over the world.

 More seriously, the CIA was particularly concerned, fearing that Chinese intelligence might have shared this information with its Russian counterpart and informed them of ways to gain access to the “Covcom” system of communications for the US intelligence contacts with its agents on Chinese lands. 

 What increased the fears of the Americans, is the disappearance of a number of American informants and spies, who were already active in Russia, and they stopped communicating with their operators from the American side at the same time that the American intelligence network collapsed in China, which confirms the Chinese handing over the secret communications code of the  Americans spies on the Russian lands as well.

  Because of the abject failure of the American intelligence in the face of Chinese superiority over it, so it tried to respond to the (Chinese National Counterintelligence Service) in November 2021, by convicting the American jury of spying for the Chinese intelligence officer (Yangun Shu), who was deputy director of the department in the (Sixth Office of the Ministry of State Security)  The Chinese officer in Jiangsu Province), which serves as the main intelligence agency of the Communist Party of China, and accused him of working to spy on US and Western military interests in favor of China, to obtain US military secrets and so on, and here the Chinese officer (Yangun Shu) was arrested in Belgium in the year  2018.  Then the final verdict was issued against the Chinese officer (Yangun Shu) on November 5, 2021, convicting the Chinese intelligence officer by a US federal jury of committing the charge of “conspiracy and attempting to commit economic and military espionage and stealing trade and military secrets for China”.

  Here, “Yang Shuo” is considered the first Chinese intelligence officer to be extradited to the United States of America. His case shows how China sought to obtain military-industrial secrets to help it militarily modernize its armed forces, which eventually enabled the People’s Liberation Army to build its vast network of Chinese advanced weaponry very quickly.

  The important thing should be noticed here is that under the (China National Security Law), every Chinese citizen and company is required to cooperate with the CPC and its leaders in matters of national security. This means, in practice, that those Chinese companies that deal with any foreign companies are still required to share any technology or information they obtain with the Chinese military or intelligence services in the Chinese state. Likewise, all Chinese researchers and graduate students working on science, technology, engineering or mathematics projects are expected to share their research with Beijing, for the welfare and development of their country.

   Accordingly, it is clear the extent of the widespread spread of the Chinese in America, Europe and the world, in order to preserve their security and the security of their homeland first, and then to obtain all the advanced technologies that allow them to develop and modernize the industrial and military infrastructure of their country, and this was revealed by “William Ivanina”, the head of the Counterintelligence and National Security Center  The United States, that the Chinese are adept in this field, by following a variety of means, through (the Chinese Ministry of State Security, United Front Action Department, People’s Liberation Army).

  The Chinese are also using a variety of ingenious tactics in this framework, including the latest electronic espionage devices and systems, to access sensitive information remotely, and what is known as “signal intelligence technology” to quickly capture information, as well as electronic intelligence, which enabled it to decipher all  The blades of American spying and wiretapping devices on its soil and abroad. Thus, the vision becomes completely clear to us, about the reasons for the dismantling of all US spy networks by Chinese intelligence on its lands.

Continue Reading

Publications

Latest

Trending