This article is from the source 'guardian' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.guardian.co.uk/world/defence-and-security-blog/2013/jun/17/spying-spooks-intelligence-addiction

The article has changed 3 times. There is an RSS feed of changes available.

Version 0 Version 1
Spying for spying's sake: spooks and their intelligence addiction Spying for spying's sake: spooks and their intelligence addiction
(35 minutes later)
Spying is said to be the world's second oldest profession. Since spying is covert by definition, it is used as a weapon against friends and allies, as well as enemies.Spying is said to be the world's second oldest profession. Since spying is covert by definition, it is used as a weapon against friends and allies, as well as enemies.
However, the startling leaks published by the Guardian demonstrate, more than ever before, how technology has hugely extended the scope of spying in a way that has unprecedented implications for personal privacy, corporate wealth, and the conduct of international relations.However, the startling leaks published by the Guardian demonstrate, more than ever before, how technology has hugely extended the scope of spying in a way that has unprecedented implications for personal privacy, corporate wealth, and the conduct of international relations.
America's National Security Agency (NSA) and its close British partner, GCHQ, the electronic eavesdropping centre based in Cheltenham, defend their activities on the grounds that they are fighting terrorism and serious crime. Documents classified top secret now passed to the Guardian, reveal they are also spending time and money spying on Russia, Turkey, South Africa, and other delegates to international conferences in bugging operations which have nothing to do with terrorism or crime. America's National Security Agency (NSA) and its close British partner, GCHQ, the electronic eavesdropping centre based in Cheltenham, defend their activities on the grounds that they are fighting terrorism and serious crime. Top-secret documents now passed to the Guardian reveal that they are also spending time and money spying on Russia, Turkey, South Africa, and other delegates to international conferences in bugging operations that have nothing to do with terrorism or crime.
The purpose is to give the UK a competitive and negotiating advantage. It is justified on legal grounds because the 1994 Intelligence Services Act says the job of GCHQ, is gather information "in the interests of the economic wellbeing of the United Kingdom". The purpose is to give the UK a competitive and negotiating advantage. It is justified on legal grounds because the 1994 Intelligence Services Act says the job of GCHQ is gather information "in the interests of the economic wellbeing of the United Kingdom".
The extraordinary scope of the act was spelled out by the then lord chancellor, Lord Mackay, during the bill's first reading. After stressing the importance of keeping "a particular eye on Britain's access to key commodities, like oil or metals", Mackay added: "The profits of Britain's myriad international business interests … and the jobs of a great many British people are dependent on the ability to plan, to invest and to trade effectively without worry or danger."The extraordinary scope of the act was spelled out by the then lord chancellor, Lord Mackay, during the bill's first reading. After stressing the importance of keeping "a particular eye on Britain's access to key commodities, like oil or metals", Mackay added: "The profits of Britain's myriad international business interests … and the jobs of a great many British people are dependent on the ability to plan, to invest and to trade effectively without worry or danger."
Three years earlier, the Guardian revealed how GCHQ bugged the communications of wide range of targets which on the face of it had nothing to do with protecting the nation's security. They included intelligence that would benefit large British companies, including the oil giants and banks, as well as the internal communications of those companies. GCHQ even bugged the pope.Three years earlier, the Guardian revealed how GCHQ bugged the communications of wide range of targets which on the face of it had nothing to do with protecting the nation's security. They included intelligence that would benefit large British companies, including the oil giants and banks, as well as the internal communications of those companies. GCHQ even bugged the pope.
The data is intercepted by GCHQ's supercomputers, and the even bigger ones operated by the agency's close partner, the NSA. The intercepts are picked up by ground stations, including the NSA base at Menwith Hill in North Yorkshire, and GCHQ's listening post at Morwenstow, Cornwall, and distributed to their closest intelligence partners – Canada, Australia, and New Zealand – via a large "Five Eyes" network called Echelon.The data is intercepted by GCHQ's supercomputers, and the even bigger ones operated by the agency's close partner, the NSA. The intercepts are picked up by ground stations, including the NSA base at Menwith Hill in North Yorkshire, and GCHQ's listening post at Morwenstow, Cornwall, and distributed to their closest intelligence partners – Canada, Australia, and New Zealand – via a large "Five Eyes" network called Echelon.
The capacity of this data-gathering network, and the uses to which it has been put, has been atacked by France as an Anglo-Saxon club indulging in industrial and economic espionage that has prevented French arms companies, for example, winning contracts where it has competed with UK and US firms.The capacity of this data-gathering network, and the uses to which it has been put, has been atacked by France as an Anglo-Saxon club indulging in industrial and economic espionage that has prevented French arms companies, for example, winning contracts where it has competed with UK and US firms.
Leaks to the Guardian have revealed the huge capacity now of NSA and GCHQ computers as well as the way they are used. The law cannot keep up with developments in intrusive, surveillance technology, as intelligence officers admit. How the data is used – against terror suspects, but not innocent individuals – is, they admit, a matter of trust, not the law. Leaks to the Guardian have revealed the huge capacity of NSA and GCHQ computers as well as the way they are used. The law cannot keep up with developments in intrusive, surveillance technology, as intelligence officers admit. How the data is used – against terror suspects, but not innocent individuals – is, they admit, a matter of trust, not the law.
Leaks of the documents suggest it is impossible to quench the appetite of the intelligence agencies and their clients, notably the very ministers to whom they are responsible. Britain's spies say they are ultimately accountable to ministers, the people who are urging the spies on, unable to resist the secret product of their covert operations. Leaks of the documents suggest it is impossible to quench the appetite of the intelligence agencies and their clients, notably the ministers to whom they are responsible. Britain's spies say they are ultimately accountable to ministers, the people who are urging the spies on, unable to resist the secret product of their covert operations.
One unanswered question is how activities such as bugging delegates to international conferences hosted by Britain can be justified, in particular at a time the security and intelligence agencies insist they need more resources to counter real threats, namely violent terrorism. One unanswered question is how activities such as bugging delegates to international conferences hosted by Britain can be justified, in particular at a time when the security and intelligence agencies insist they need more resources to counter real threats, namely violent terrorism.
That question will become even more important as the data-gathering capabilities of computers increase beyond the reach demonstrated by the latests leaks.That question will become even more important as the data-gathering capabilities of computers increase beyond the reach demonstrated by the latests leaks.
Our editors' picks for the day's top news and commentary delivered to your inbox each morning.Our editors' picks for the day's top news and commentary delivered to your inbox each morning.
Our editors' picks for the day's top news and commentary delivered to your inbox each morning. Enter your email address to subscribe.Our editors' picks for the day's top news and commentary delivered to your inbox each morning. Enter your email address to subscribe.
Our editors' picks for the day's top news and commentary delivered to your inbox every weekday.Our editors' picks for the day's top news and commentary delivered to your inbox every weekday.