Stone Ghost STONEGHOST or "Stone Ghost", is a codename for a network operated by the United States' Defense Intelligence Agency (DIA) for information sharing and exchange between the United States, the United Kingdom, Canada and Australia. Other sources say that New Zealand is also participating, and that STONEGHOST therefore connects, and is maintained by the defense intelligence agencies of all Five Eyes countries. STONEGHOST does not carry Intelink-Top Secret information and was previously known as Intelink-C and may also be referred to as "Q-Lat" or "Quad link". It's a highly secured network with strict physical and digital security requirements. The network not only hosts information about military topics, but also about SIGINT, foreign intelligence and national security. 2012 Canadian Spy Case Royal Canadian Navy intelligence officer Sub-Lt. References
Defense Security Service (DSS) CIA Counterterrorist Intelligence Center Description of CTIC According to Dana Priest's article, on which the CIA declined to comment at the time: The CTIC were modeled on the CIA's counternarcotics centers in Latin America and Asia. In the 1980s the CIA persuaded these states to let it select individuals for the assignment, pay them and keep them physically separate from their own institutions. Officers from the host stations serving in the CTICs are vetted by the CIA, and usually supervised by the CIA's Chief of Station and augmented by officers sent from the Counterterrorist Center at Langley. According to two intelligence officials interviewed by Dana Priest, "the first two CTICs were established in the late 1990s to watch and capture Islamic militants traveling from Saudi Arabia, Yemen, Egypt and Chechnya to join the fighting in Bosnia and other parts of the former Yugoslavia." Alliance Base Italy See also Alliance Base, a CTIC in Paris, France. References
Les sociétés militaires privées : La mort par procuration « En temps de paix, le mercenaire dérobe ; en temps de guerre, il déserte. » Nicolas Machiavel Environ 90 personnes ont été tuées le 1er septembre dans un bombardement de l’OTAN en Afghanistan. L’ONU avait auparavant demandé l’ouverture d’une enquête « approfondie ». Bernard Kouchner a fait valoir que les Européens devraient revoir à la hausse leurs contributions financières. « Les taliban offrent 50 dollars par famille, ce qui permet de vivre un mois entier, alors que nous payons seulement la moitié. Qu’est-ce qu’un mercenaire ? Un mercenaire, du mot latin merces qui signifie salaire, est un combattant étranger aux parties en conflit, « spécialement recruté dans le pays ou à l’étranger » et qui « prend une part directe aux hostilités ». La contribution suivante nous permet de comprendre le mécanisme de recrutement. « Londres, septembre 2004. Blackwater est une multinationale rentable...1 milliard de dollars de contrats avec l’Etat américain. L’impunité des mercenaires
2002-2009 Alliance Base International cooperation between intelligence agencies Its existence was first revealed by a November 17, 2005, article by Dana Priest in The Washington Post, who also broke the story concerning the existence of the CIA's "black sites". In the article, both the CIA and the French government declined to comment on Alliance Base, while all intelligence officers requested anonymity due to the sensitive nature of the project, in particular relating to its political and judicial dimensions. "No country wanted to be perceived as taking direction from the CIA," wrote Dana Priest, while France was the only European state willing to engage in more than simple information exchange. "To play down the U.S. role, the center's working language is French," told an anonymous source to the Washington Post investigative reporter. "The base selects its cases carefully, chooses a lead country for each operation, and that country's service runs the operation." John E. References
Groupe GEOS Carnivore (software) The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable Jaz disk drive. This computer must be physically installed at an Internet service provider (ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit. The technology itself was not highly advanced — it used a standard packet sniffer and straightforward filtering. The critical components of the operation were the filtering criteria. Several groups expressed concern regarding the implementation, usage, and possible abuses of Carnivore. The FBI countered these concerns with statements highlighting the target-able nature of Carnivore. The Carnivore device works much like commercial "sniffers" and other network diagnostic tools used by ISPs every day, except that it provides the FBI with a unique ability to distinguish between communications which may be lawfully intercepted and those which may not.
Lignes de défense