• mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    ·
    2 months ago

    This is funny considering the state department has direct contacts within SK’s government who provide real-time info about the president’s conversation with his government members.

    • circuscritic@lemmy.ca
      link
      fedilink
      English
      arrow-up
      19
      ·
      2 months ago

      Allies spy on each other, it’s not unusual or shocking.

      Eventually she will be exchanged as part of some backroom deal, or in exchange for someone imprisoned in SK for providing information to the CIA.

    • CanadaPlus@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      2 months ago

      All countries spy on all other countries, generally speaking. Exceptions are usually going to be down to resource constraints, not principles.

      As an asset you still go to jail if you get caught. Or killed in potentially nasty ways, if it’s a less democratic country.

    • CanadaPlus@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      I imagine they don’t pay you if you don’t work there, at the very least, and clearance only lasts as long as you keep it up to date.

  • Don_Dickle@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    5
    ·
    edit-2
    2 months ago

    Is it just me or is the CIA and inept network. They let a double agent giving secrets to Russia go for decades.

    • blackbelt352@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 months ago

      The thing with intelligence agencies isn’t about the information they collect or apread but the means and methods of they collect or spread information.

      If ABC intelligence agency knows someone is a double agent feeding state secrets to XYZ foreign agency, that double agent can go be unknowingly molded into an asset for ABC by feeding them inaccurate information, or their patterns can be used to uncover other undiscovered agents and gain insights into other potential security holes.