domingo, 18 de junio de 2023

 

SOVEREIGNTY AND STRATEGIC SECURITY

Why does Argentina have much to develop in its strategic defence?

 

By Sir Charlattam

An innocent cruise ship, the “Costa Victoria” arrived from Montevideo to the port of Buenos Aires in the spring of 2007, and on it, two thousand three hundred and ninety-two tourists, mostly Europeans and Americans, who before continuing on to Patagonia would disembark for a few days to get to know the “Reina del Plata” (Queen of the River Plate). At first sight, one of the many foreigners who arrive to visit and spend their dollars in the gastronomy and hotels of the country.

In short, one of the many visits that cruise companies organise to the region, one of the ways in which MI-6 enters your backyard without invitation.

But on this visit came a peculiar young female couple, one of many who disembarked from that cruise ship. With an apparent American accent, wearing colourful clothes and infectious laughter, they strolled through the mythical neighbourhood of “La Boca” and “San Telmo” like any tourist arriving in Buenos Aires. In reality, they were two MI-6 assets on a field mission. They did not enter through any windows, nor did they dress in black or climb over walls to penetrate any government building or carelessly enter the military sites of the Navy or the Ministry of Defence. Sitting in a cafe in “Retiro” and each with a laptop like any other internet user, they were actually maintaining encrypted communication with the GCHQ station at Mount Pleasant (in the Falklands) to corroborate the range and clarity of the signal with which they would intercept and listen in on communications from the main government buildings in the city. This was a combined HUMINT-SIGINT online operation that the Argentines never imagined could happen, demonstrating intolerable security vulnerabilities.

According to an old friend who still walks the corridors of the so-called “dirty tricks” department in the building you know on the banks of the Thames, one of those ladies was an Irishwoman in the service of MI-5 who, by those miraculous things in life, moved into the foreign service.

For years before and after the 1982 war, intelligence had been intercepting communications from camouflaged fishing and commercial vessels flying EU flags that calmly sailed the Atlantic a few miles off the coast. Obviously the Argentines had no chance of detecting these operations, although if they had noticed them they could have done nothing. But all the credit for this did not go to the ISI (MI-6). They had (and still have) the assistance of the NSA's electronic intelligence satellite and antenna system “Echelon”, which collected and collated information for NATO.

The British bureaucrats have their own electronic intelligence called Government Communications Headquarters (GCHQ) through which the Foreign Office has been operating since the end of the war and with a base in the South Atlantic against the sovereign integrity of Argentina's communications, much more so since the installation in 2012 of the P.R. China base in the province of Neuquén. In reality, the intrusion and intelligence gathering activities go beyond Argentina and reach the whole region. Once again, I would ask what measures and counter-measures Argentina developed to protect its sovereignty in the face of these intrusions that affected and continue to invade its political sovereignty?

The answer is trite and it is none. Both the post-1982 and Kirchnerist governments, especially during the period when agents under orders from the Foreign Office were operating at full fury, left the Armed Forces and their intelligence agencies without resources, objectives or clear policies to deal with this problem.

The conditioning agreed in the Madrid treaties of 1989 and 1990, in which the Argentine representatives handed over operational control of the Armed Forces and intelligence to London, was compounded by the “stupidity” and false “humanism” that masked itself behind the human rights organisations with ideology (i.e.., right for some only) and which formed part of the “human rights” agenda, The absence of an updated defence policy and the lack of a new and updated intelligence policy, which was the core of the government at the time, favoured the free operation of the intelligence agencies under the noses of the officials of the Casa Rosada, so much so that at times some in the intelligence commissions of the Parliament have asked themselves: “Don't they really work for us?”

The absence of an updated defence and strategic security policy was a fact, to which was added the lack of technological advances of our own to develop cyber intelligence and counterintelligence activities, a spectrum that the Anglo-American departments and agencies had already been exercising since the Cold War era through the multinational intelligence agency “Five-Eyes”.

Among the most important operations that are carried out through cyberspace (intruding the internet) and that go beyond simple espionage, they pursue various strategic objectives such as “creating mistrust”, “discrediting”, “deceiving”, “setting false flags”, “shocking”, “degrading”, “dissuading”, briefly, any form of subverting the political and social situation of the target country, in this case Argentina and focused on the entire period of the Kirchnerist populist government.

When, in 2017, the sinking of the “San Juan” submarine occurred, which revealed classified and unmentionable manoeuvres and therefore had to be kept quiet, these dirty resources were used with the internal support of the Argentine government itself, which for reasons of sympathy and political adherence had a direct line to Cameron.

Today many of these resources are being used intensively in Eastern Europe and in particular in Ukraine, especially by the Ukrainian Armed Forces and the SBU intelligence. Unlike in Argentina, JTRIG's dirty tricks and attempts to hack into Russian computer systems have been fruitless and only in some cases have they penetrated, with poor results.

As of today, Argentine defence resources are still behind the recommended level and beyond having some systems and software of Israeli origin, this is not enough to cover the cyber defence gap they have exposed and they should also know that the backdoors of these systems are shared with London.

 

 

No hay comentarios.:

Publicar un comentario