United States consistently underestimates Cuban intelligence, sources say

AGENTS OF THE CUBAN government have “penetrated virtually every segment of the United States national security structure,” enabling Havana to share actionable intelligence with Russia and China, according to a new report. Citing former United States and Cuban intelligence officers, The Wall Street Journal said on Saturday that Washington’s counter- intelligence efforts are no match for Cuba and its intelligence service, the Dirección de Inteligencia (DI). The DI is “the best damn intelligence service in the world” for cultivating agents, according to Brian Latell, a retired CIA analyst who served as the U.S. Intelligence Community’s National Intelligence Officer for Latin America. Latell told The Wall Street Journal that the Dirección de Inteligencia bears the imprint of Fidel Castro himself, who took a personal interest in running the service during his reign.

Among the strengths of the Cuban intelligence service is its ability to recruit Americans who are motivated by ideological reasons, rather than by financial gain. The Cubans have historically approached Americans at a young age, usually at universities in the United States or other countries in the Americas. They cultivate those relationships by employing strategic patience that pays off many years —even decades— later. By recruiting ideological sympathizers, the Cubans rarely need to pay their agents large amounts of money, as the cases of Defense Intelligence Agency analyst Ana Belén Montes and State Department diplomat Manuel Rocha suggest. Many Cuban agents enter military service in the United States, which means they acquire Secret or Top-Secret clearances. Others are instructed to penetrate anti-communist groups of Cuban-Americans in southern Florida, according to The Wall Street Journal.

The U.S. counterintelligence strategy prioritizes Russia and China, which means that Cuban intelligence operations are treated as “an afterthought,” claims the paper. The Federal Bureau of Investigation (FBI), America’s primary counterintelligence agency, dedicates relatively few resources to investigating Cuban intelligence. Its efforts are chronically “understaffed and outmatched” by Havana, according to former counterintelligence officers who spoke to The Wall Street Journal. The paper notes that the FBI is often aware of several dozen cases of “actual or potential” Cuban agents operating in the U.S. However, it routinely lacks the requisite resources to investigate them.

Author: Ian Allen | Date: 18 March 2024 | Permalink

CIA director secretly visits Somalia and Kenya amidst rising tensions in East Africa

Al-Shabaab - IAWILLIAM BURNS, DIRECTOR OF the United States Central Intelligence Agency (CIA), reportedly visited in secret at least two East African nations last week, amidst growing tensions and instability in the region. The trip was confirmed by both the Kenyan and Somali governments after Burns had already returned to the United States.

Reports indicate that Burns held a high-level meeting on Monday in Nairobi with Kenyan President William Ruto and Noordin Haji, the director of Kenya’s National Intelligence Service. The United States Ambassador to Kenya, Margaret Whitman, was also reportedly present at the meeting. Later in the week, on Thursday, the CIA director met with Somali President Hassan Sheikh Mohamud in Mogadishu before departing for the United States.

The specific details of the discussions during Burns’ visit remain undisclosed, leading to considerable speculation. Notably, it is highly unusual for senior American intelligence officials to personally visit sub-Saharan Africa, as the CIA typically communicates with the local governments through station chiefs or American ambassadors. Burns’ in-person visit suggests compelling reasons for the direct engagement.

According to some Kenyan news outlets, discussions encompassed the escalating instability in sub-Saharan Africa, which are stemming from various sources. These include the ongoing conflict in Sudan between government-aligned forces and militias loyal to the paramilitary Rapid Support Forces. Additionally, there is growing turmoil in the Democratic Republic of Congo after last month’s elections, resulting in the re-election of President Félix Tshisekedi. Disputes over the election’s fairness have led to military deployments to maintain peace amid rising tensions throughout the country.

Washington’s concerns also revolve around the continuing presence of al-Shabaab in East Africa. Operating in Somalia, al-Shabaab, an al-Qaeda-linked armed group, engages in conflict with the Somali government and is responsible for several terrorist attacks in Kenya. The United States currently has around 500 military advisors in Somalia, supporting the Somali government in its efforts against al-Shabaab.

Notably, the CIA has not issued an official statement regarding Burns’ visit to East Africa.

Author: Ian Allen | Date: 22 January 2024 | Permalink

South Korean president fires nation’s spy chiefs in major intelligence shake-up

NIS South Korea - IAIN A SURPRISING MOVE that has stirred curiosity across Asia, South Korean President Yoon Suk Yeol has abruptly ousted the entire senior leadership of the National Intelligence Service (NIS), a powerful entity in the country. The announcement came through a statement released on Sunday by the Office of the President, stating that President Yoon had accepted the resignations of the NIS director and two deputy directors. However, it is widely understood that these resignations were not voluntary but rather a result of pressure exerted by the president.

Among those dismissed, Director Kim Kyou-huyn and First Deputy Director Kwon Chun-taek, both considered close to President Yoon, had lengthy backgrounds in South Korea’s diplomatic corps. Kim, a seasoned executive with deep insights into South Korea-United States relations, had served lengthy tours in the South Korean embassy in Washington. Kwon, with experience in the diplomatic corps and roles at the United Nations, also had a strong international background. Yoon had appointed both to lead the NIS soon after assuming the presidency in May 2022. The third ousted NIS executive was Second Deputy Director Kim Soo-youn, appointed by Yoon in June 2022. The second deputy traditionally oversees activities related to North Korea, while the first deputy is responsible for the agency’s global collection operations, counterterrorism, and counterintelligence.

Speculation in Seoul abounds regarding the reasons behind President Yoon’s swift decision to dismiss the NIS leadership. A firebrand politician who is seen as a representative of a new generation of South Korean conservatives, Yoon has pledged a robust security and defense policy in response to perceived North Korean provocations. Recent media reports have hinted at Yoon’s impatience with bureaucratic obstacles within the NIS, particularly regarding personnel management.

South Korean media reports indicate that another seasoned diplomat, Hong Jang-won, has assumed the NIS first deputy directorship, while the former North Korea area chief, Hwang Won-jin, has taken over as the second deputy director. Notably, the director position remains vacant, with Hong temporarily leading the agency until a new director is appointed in the coming weeks.

Author: Ian Allen | Date: 27 November 2023 | Permalink

Two arrested in Britain for spying for China, report reveals

House of Commons Parliament Britain United KingdomAUTHORITIES IN BRITAIN HAVE arrested two individuals on charges of espionage, among them a researcher for the British parliament who is being investigated for spying for China. According to the British newspaper The Sunday Times, the two individuals were arrested on March 13 of this year in two different addresses. One of the suspects, reportedly in their 30s, was arrested in or around the city of Oxford. The other, reportedly an individual in their mid-20s, was apprehended in the Scottish capital Edinburgh.

A third address, located in an eastern borough or London, was also searched by the Counter-Terrorism Command of the Metropolitan Police, which is leading the investigation into the two suspects. Notably, the parliamentary researcher had worked for prominent members of the Conservative Party, including members of parliament. These reportedly included Alicia Kearns, who chairs the Foreign Affairs Select Committee of the British House of Commons. The Times reported that the suspect had also worked for the Minister of State for Security Tom Tugendhat. The Guardian newspaper reported that Tugendhat said he had not been in touch with the suspect since he assumed his current ministerial role in September of 2022. Kearns did not comment on the case.

The last time a British newspaper reported claims of Chinese espionage was in February of 2021, when The Telegraph reported on the expulsion of three Chinese citizens, who were working as journalists. The paper claimed that the three had been “quietly expelled” after they were caught carrying out espionage. Citing an anonymous “government source”, The Telegraph said that, according to Britain’s Security Service (MI5), the three Chinese journalists were in reality employees of China’s Ministry of State Security. The report did not provide details about when the three Chinese citizens had been expelled, saying only that the expulsions had occurred at different times in the previous year.

According to The Times, the two suspects who were arrested in last March were initially transferred to a south London police station, where they were arraigned. They were then released on bail and are expected to appear in court in October.

Author: Ian Allen | Date: 11 September 2023 | Permalink

Poland’s super-secretive ‘school of spies’ marks 50 years of operation

ABW PolandDURING THE COLD WAR, Poland hosted the Eastern Bloc’s only known intelligence training facility for operations officers situated outside of the Soviet Union. The highly secretive training facility operated out of a heavily guarded compound located near the northern Polish village of Stare Kiejkuty in Gmina Szczytno county, approximately 65 miles from the Polish-Soviet border. Today, 50 years after its establishment, the facility continues to train the operations officers of post-communist Poland’s intelligence services.

During World War II, and in the immediate post-war period, Soviet authorities trained Polish intelligence personnel in Kuybyshev (in 1991 renamed to Samara) in southwestern Russia. This setup continued following the establishment of the Soviet-controlled Polish intelligence community. By the 1960s, the Polish intelligence community was being led by the Ministry of Public Security, referred to by its Polish initials, SB. The SB’s elite operations officers, which staffed its First Department, were all trained in the Soviet Union and in a Soviet-controlled facility in Warsaw.

But in 1970, Poland’s reformist President, Edward Gierek, put in motion a plan to modernize the Polish intelligence services. Gierek’s goal was for Polish intelligence to catch up with the pace of technological development, especially in the emerging digital realm. He also wanted Polish spy organizations to be able to compete directly against rival agencies in Western Europe. The rapid establishment of the Intelligence Personnel Training Centre near Stare Kiejkuty was the centerpiece of Gierek’s intelligence reforms.

Construction began in 1971 and was mostly completed within two years. In 1973, the heavily guarded training facility, which had been disguised as a “holiday resort” in official government maps, welcomed its first students. Students were taught how to operate undercover in the West and how to recruit sources in countries like West Germany, France and the United Kingdom. They were taught about Western European lifestyles and had access to Western products, including soft drinks and vending machines, which were absent from Polish life. Read more of this post

Israeli, Italian intelligence officers drown as boat capsizes in Lake Maggiore

ONE ISRAELI AND TWO Italian intelligence officers are among the victims of a boating accident in northern Italy. Local reports indicate that the incident occurred last Sunday evening, when a passenger boat named the Gooduria capsized and sank rapidly in Italian territorial waters. The boat was on a sightseeing trip near the Italian shoreline of Lake Maggiore, a popular destination situated on the southern side of the Alps between Italy and Switzerland.

It has been reported that nearly all of the approximately two dozen passengers aboard the Gooduria were current or former members of the Italian and Israeli intelligence services. These individuals were believed to have collaborated professionally as intelligence officers and had gathered for “a convivial meeting to celebrate the birthday of one of the group”, according to a statement issued by the Italian government.

It is worth noting that some Italian news outlets have expressed skepticism about the precise nature of the gathering. An article in the Italian daily Corriere della Sera suggested that “the gathering was a working meeting of intelligence agents”. Another Italian daily, La Stampa, said that the gathering was “an opportunity to exchange information between agents of the two countries”. These claims have not been confirmed by the Italian and Israeli governments.

Italian authorities have stated that no foul play is suspected in the accident. Instead, it is believed that inclement weather, possibly coupled with overcrowding onboard the Gooduria, contributed to the incident. The Ministry of Foreign Affairs of Israel released a brief statement on Sunday acknowledging the death of a retired member of the Israeli intelligence services, without identifying the victim by name or professional title. However, local media reports have identified the deceased as Shimoni Erez, 50, a recent retiree from the Mossad, Israel’s external intelligence agency.

The two Italian victims of the accident have been identified as Claudio Alonzi, 62, and Tiziana Barnobi, 53, both of whom were intelligence officers. Additionally, among the casualties was a Russian national named Anna Bozhkova, 50, who was reportedly the wife of the captain of the Gooduria. Following the capsizing of the boat, Israeli diplomats promptly arranged for the immediate evacuation of ten active Israeli intelligence officers from Italy. They were swiftly removed from regional hospitals and transported back to Israel via a military flight.

Author: Ian Allen | Date: 31 May 2023 | Permalink

Australian court releases judge’s remarks in unprecedented ‘secret prisoner’ trial

first-post-v-2AN AUSTRALIAN HIGH COURT has released the sentencing remarks in an unprecedented closed-door trial of an intelligence officer, identified only as “Witness J”, who was convicted in 2019 of a crime that cannot be revealed. The man, who is also known as “Prisoner 123458,” was given a jail sentence in November of 2019. His sentencing came following a closed-door hearing, which was described by a judge as “generally undesirable” and “unusual”. The very existence of the court case came to light only after Witness J filed a lawsuit against the jail in which he was being held, arguing that his treatment was substandard.

Witness J is believed to be in his mid-30s and to have served for many years as an intelligence officer in the Australian military, with a top secret security clearance. He is also believed to have served in Iraq, Afghanistan and East Timor with a distinguished service record. But he drew the attention of counterintelligence investigators in 2018, while undergoing a routine re-evaluation of his security clearance status. During that time he was reportedly serving as a civilian in an undisclosed country in Southeast Asia. This period, according to reports, coincided with the deterioration of Witness J’s mental health.

Witness J was eventually jailed in mid-May 2018 and spent a month in solitary confinement. He was then placed in a high-security wing for serious sex offenders at the Alexander Maconochie Centre prison in Canberra. This was not because he was a sex offender, but because it was determined that he would be safer there than in the other wings of the prison. In early 2019, Witness J was sentenced in a closed-door trial, which was held under the secrecy provisions of Australia’s 2004 National Security Information Act. He was released from prison 15 months into his 24-month sentence, after agreeing to plead guilty to security breaches.

Last week, the Supreme Court of the Australian Capital Territory (ACT) released the sentencing remarks of the judge in Witness J’s case, which had remained secret since November of 2019. According to ABC News, the remarks are heavily redacted in order to comply with restrictions under the National Security Information Act. The redacted document makes clear that Witness J faced a total of five charges. However, the sentencing remarks make no mention of the nature of the charges against him.

In his remarks, the judge in the case, Justice John Burns, mentions that the court had been given a report by Witness J’s doctor, which detailed his deteriorating mental state and his depression. The judge goes on to explain that he took the doctor’s report into account in sentencing Witness J. He argues, however, that despite his illness, the accused was aware of his actions and deliberately chose to conduct himself in a “grossly reckless” manner.

Author: Ian Allen | Research credit: P.C.| Date: 24 April 2023 | Permalink

WHO calls on US and China to release intelligence about origins of COVID-19

World Health OrganisationTHE WORLD HEALTH ORGANIZATION has called on the United States and China to share what they know about the source of the COVID-19 pandemic. The call, made by WHO’s Director-General Dr. Tedros Adhanom Ghebreyesus and others, came days after United States Federal Bureau of Investigation Director Christopher Wray said in a television interview that COVID-19 “most likely” originated from a Chinese government laboratory.

Wray made the statement last week in a televised interview with Fox News, in response to a question about the origins of the COVID-19 virus. Wray said that, “for quite some time now”, the FBI has “assessed that the origins of the pandemic are most likely a potential lab incident in Wuhan”, a city in central China. Wuhan hosts the Wuhan Institute of Virology, which includes laboratories that specialize on biosecurity and the study of newly emerging infectious diseases. Wray added that Beijing has “been doing its best to try to thwart and obfuscate the work” of the United States in trying to determine the precise origins of the virus.

Late last week, Dr. Maria Van Kerkhove, an infectious disease epidemiologist and the WHO’s technical lead on COVID-19, said the WHO had contacted the United States’ mission to the United Nations in Geneva, Switzerland, to inquire about the information that informs the FBI’s assessment. On Friday, meanwhile, Dr. Tedros called for “any country [with] information about the origins of the pandemic” to come forward. The WHO Director-General went on to say that “it’s essential for that information to be shared with WHO and the international scientific community”.

The WHO also called on China “to be transparent in sharing data and to conduct the necessary investigations and share the results” with the global scientific community, “not so as to apportion blame, but to advance our understanding of how this pandemic started, so we can prevent, prepare for and respond to future epidemics and pandemics”. When asked about the WHO’s own investigation into the origins of COVID-19, Dr. Tedros responded that “all hypotheses on the origins of the virus remain on the table”.

In the meantime, China responded angrily to the FBI director’s comments. Beijing has previously dismissed claims that COVID-19 may have emerged as a result of an accident at a Chinese government-funded lab as a disinformation campaign designed to smear its image and reputation around the world. Last week, Mao Ning, a spokeswoman for China’s Ministry of Foreign Affairs, reacted angrily to allegations that the government of China is responsible for the COVID-19 pandemic. Mao called on the United States to “look to its own biological laboratories scattered across the world when searching for the virus’s source”.

Author: Ian Allen | Date: 08 March 2023 | Permalink

[Updated] Self-styled creator of pro-Russian ‘Z’ symbol reportedly assassinated

UkraineA LEADING RUSSIAN NATIONALIST, who styled himself as the originator of ‘Z’, the symbol of the Russian campaign in Ukraine, has reportedly died after being shot in the head in an apparent assassination. Igor Mangushev, 36, is a prominent figure in Russia’s nationalist circles. A vocal supporter of Russian premier Vladimir Putin, Mangushev’s hardline and unapologetically nationalist social media presence has helped popularize the Kremlin’s policies among younger Russians.

By the late 2010s, Mangushev had spent nearly a decade in Russian ultra-nationalist street gangs. Eventually a pro-Kremlin paramilitary group he founded and led, known as Svetlaya Rus (Light Rus), was conscripted by the Russian military to assist in grey zone operations in the separatist regions of eastern Ukraine. It was in Ukraine that Mangushev’s group merged with other armed ultra-nationalist clusters to form the so-called Yenot (Raccoon) private military company, or Yenot PMC. Soon after the outbreak of the war in Ukraine, Mangushev began to describe himself (without evidence) as the creator of the ‘Z’ symbol that the Kremlin uses as a sign of support for the Russian military campaign.

In the ensuing years, Yenot PMC paramilitaries saw action in several battles in Ukraine and in Syria. In the meantime, Mangushev worked alongside close Putin ally Yevgeny Prigozhin, the alleged owner of the Wagner Group, one of the world’s largest private military companies. There was much fanfare in Russian nationalist social media circles last year, when Mangushev (using the moniker “Bereg”) announced he had joined the Russian Armed Forces at the rank of captain. It is believed, however, that Mangushev’s Russian military title was nominal, and that continued to operate as leader of the Yenot PMC. Read more of this post

Embattled Libyan government announces surprise visit by CIA director

THE GOVERNMENT OF WAR-torn Libya announced on Thursday that William Burns, director of the United States Central Intelligence Agency (CIA) was in capital Tripoli for discussions with senior Libyan officials. By visiting Tripoli, Burns became the highest-ranking American government official to travel to the North African country under the presidency of Joe Biden.

According to reports in the Libyan media, Burns spent most of Thursday in Tripoli, where he met with Abdul Hamid Dbeibah, a controversial businessman who is serving as prime minister in the Government of National Unity (GNU). Burns also met with GNU Minister of Foreign Affairs Najla al-Mangoush, as well as with Hussein al-Ayeb, who leads the GNU’s intelligence agency. The CIA director also met with Field Marshal Khalifa Haftar (pictured), head of the Libyan National Army (LNA). The LNA nominally supports the GNU’s rival government in eastern Libya, the Government of National Stability (GNS). However, Haftar is seen by many as Libya’s de facto strongman. Notably, Burns did not meet with Fathi Bashagha, the self-styled ‘prime minister’ of the GNS, which, unlike the GNU, is not recognized by the United Nations, but is supported by a number of regional powers, including NATO member Turkey.

Al-Monitor reported that the subject of the GNU’s relations with Russia was high on the agenda during Burns’ visit, as was the subject of Libya’s energy exports to Europe. Counterterrorism was also discussed, which is unsurprising, given that last month the GNU surrendered Abu Agila Mohammad Mas’ud Kheir Al-Marimi to American authorities. Washington alleges that Al-Marimi was involved in the 1988 downing of Pan Am Flight 103 over Lockerbie, Scotland, which was conceived and plotted by the regime of the late Colonel Moammar al-Gadhafi. The move was seen as an attempt by the GNU to strengthen relations with Washington, in light of the challenge it faces from the GNS and the LNA.

Author: Ian Allen | Date: 13 January 2023 | Permalink

Female targets of QAnon conspiracy attacked up to 10 times more, study finds

QAnon - IAFEMALE TARGETS OF CONSPIRACY theories propagated by QAnon adherents face up to 10 times more online harassment and abuse than male targets, a behavioral study of pro-QAnon online users has found. QAnon refers to an American-rooted conspiracy theory that views former United States President Donald Trump as a central figure in a behind-the-scenes battle against a sinister cabal of enemies, known as the “deep state”. According to QAnon adherents, “deep state” elites (politicians, entertainment figures and other celebrities) consist of Satan-worshiping cannibals who traffic children for sex. QAnon adherents also believe that these elites will be routed during “The Storm”, a final reckoning between Trump and the “deep state”, which will result in the arrest and physical extermination of all elites.

But in a new study published last month by the London-based Institute for Strategic Dialogue (ISD), a team of researchers posits that not all victims of QAnon adherents are targeted with equal intensity by the conspiracy theorists. Concordia University PhD candidates Marc-André Argentino and Adnan Raja, and ISD analyst Aoife Gallagher, used online data collected in 2020 and early 2021. They categorized the data according to six case studies involving celebrity figures, ranging from Tom Hanks and Anderson Cooper to Ellen DeGeneres and Oprah Winfrey, all of whom have been prominent targets of QAnon conspiracy theories.

The researchers found that, in each case, online attacks proliferated quickly once individual targets were “labelled and perception [was] hardened in narratives about their alleged role in pedophilia and/or sex trafficking”. What followed was coordinated hate and harassment campaigns that included “forms of high-volume brigading” —a coordinated attack by groups of users united by belonging to the same antagonistic subreddit. In each case, negative sentiments were amplified through the multiplication of coordinated hateful —and often violent— content.

The study shows that “[g]ender-based, racist and anti-LGBTQ+ hate and rhetoric” was present throughout the dataset. However, of all factors —gender, race or sexual orientation— relating to the identities of targets, gender was by far the most determining. According to the data analysis, female targets of QAnon brigading were subjected to volumes of hate and harassment that were as many as ten times higher than those of their male counterparts. The study also shows that this gender-based variation was true in every platform used, such as Facebook (primarily), Instagram and Twitter.

Author: Ian Allen | Date: 21 November 2022 | Permalink

Tip by confidential human source guided FBI search of Trump’s home, reports claim

Mar-a-Lago MULTIPLE NEWS OUTLETS CLAIMED on Wednesday that Monday’s search by authorities of a Florida residential compound belonging to former United States President Donald Trump was based on information provided to the Federal Bureau of Investigation by a confidential human source. The source reportedly gave the FBI details about a number of classified documents that were allegedly hidden in Trump’s Florida estate, as well as their precise location.

America’s troubled political waters turned stormy once again on Monday morning, when around 35 FBI special agents and technical support personnel arrived at Trump’s Mar-a-Lago estate in a convoy of unmarked vehicles. The FBI team proceeded to execute a search warrant, which authorized them to confiscate government files that were allegedly in storage at the luxury estate. According to the 1978 Presidential Records Act, these files belong to the state and should have been deposited to the National Archives upon Trump’s departure from the White House in January of 2021.

On Monday afternoon, the FBI staff reportedly left Trump’s residence with between 10 and 15 boxes of documents. In the ensuing hours, a number of commentators pointed out that, as per Trump’s attorney Lindsey Halligan, who observed the search in person, the FBI focused on just three rooms, ignoring the rest of the sprawling mansion —namely Trump’s office, a bedroom and a storage room. That, according to some, points to the strong possibility that the FBI special agents had prior information about the location of the files.

On Wednesday morning, Newsweek said it could confirm that the FBI had prior information about the precise location of the files. The news outlet cited two senior government officials, including “an intelligence source” who had “direct knowledge of the FBI’s deliberations” in the days leading up to the search. According to the sources, during the first week of August the government prosecutor in charge of the case was able to secure a search warrant by a West Palm Beach judge. The prosecutor reportedly did so by providing the judge with “abundant and persuasive detail” about the files, which “proved that those records were contained at Mar-a-Lago […] in a specific safe in a specific room”.

On Wednesday evening, The Wall Street Journal also reported that the FBI had been approached by “someone familiar with stored papers”. The source allegedly provided government investigators with information about the precise location of “classified documents” at Mar-a-Lago. The paper added that the FBI confidential source had direct access to the documents.

The US attorney general’s guidelines [PDF] define FBI confidential human sources as individuals who are “believed to be providing useful and credible information to the FBI for any authorized information collection activity”. They further stipulates that the FBI expects or intends to obtain “additional useful and credible information” from confidential human sources in the future, thus it usually builds a long-term relationship with these individuals. The guidelines also note that, given the sensitivity of the role of confidential human sources, their “identity, information or relationship with the FBI warrants confidential handling”.

Author: Ian Allen | Date: 11 August 2022 | Permalink

Ukraine war prompts European Union to overhaul counter-surveillance practices

European Commission buildingTHE POLITICAL FALLOUT OF the Russian invasion of Ukraine is prompting the European Union (EU) to radically upgrade the security of its facilities, according to a series of internal memoranda. On July 14, the EUObserver, an EU-focused news agency based in Brussels, said it had seen an internal EU document that describes the creation of a new anti-surveillance unit. The unit’s mission will reportedly center on providing security for closed-door EU meetings, using counter-measures standards employed by the North Atlantic Treaty Organization (NATO).

According to EUObserver, EU member states have agreed to establish a so-called “CSC-TSCM Expert Group,” which will spearhead the formation of this new unit. In security parlance, TSCM stands for technical security counter-measures, a method of counter-surveillance. In their most basic form, TSCM operations are carried out by teams of technical experts trained in the use of anti-bugging equipment. These are able to detect radio emissions, which are generated by most surveillance devices —commonly referred to as ‘bugs’.

The internal memorandum stipulates that the “CSC-TSCM Expert Group” will be officially set up after July 25. It will consist of experts from several EU states. The resulting unit’s mission will be to “prevent, detect and potentially neutralise eavesdropping of information in any physical or electronic form,” the memorandum states. Counter-measures operations will include regular inspections of “facilities and vehicles and the protection of classified meetings” in buildings that house the EU Council, EU Parliament, and the European Commission.

The forthcoming formation of the “CSC-TSCM Expert Group” appears to be closely linked to news, published earlier this month, relating to the construction of a new facility. The new facility is described in the media as an EU “secure bunker.” According to the EUObserver, the €8 million ($8.07 million) enclosed space will operate as a designated EU sensitive compartmented information facility (SCIF). The term denotes a secure area within a larger building, which is used to discuss sensitive topics and process classified information. Read more of this post

In rare move, Israel identifies special operations officer killed in Gaza Strip raid

IDF Gaza Strip HamasIN A RARE MOVE, Israel released the identity last weekend of a special operations officer who was killed by Islamic Hamas during a 2018 covert mission in the Gaza Strip. As intelNews reported at the time, an undercover team of Israeli operatives was exfiltrated by helicopter from Gaza on November 11, 2018. The exfiltration took place after the Israelis were spotted by members of the Izz ad-Din al-Qassam Brigades, which is part of Hamas’ armed wing.

The incident was followed by a barrage of nearly 500 rockets and mortars fired from the Gaza Strip into Israel. The Israelis responded by firing more than 160 missiles that fell throughout the Palestinian enclave. Hostilities were halted on November 13, when Hamas declared a unilateral ceasefire brokered by Egypt. The incident prompted the resignation of Israel’s Defense Minister, Avigdor Liberman. At the time, the Israel Defense Forces, which were behind the botched operation, refused to comment on the team’s mission, admitting only that its troops “operated […] in the Gaza Strip”.

It was said at the time that the members of the undercover team were dressed in civilian clothes and that at least two of them were disguised as women. After entering Gaza in a civilian Volkswagen vehicle, they drove to Khan Yunis, a city in the south of the Strip, near the Egyptian border. It was there that they were discovered by the al-Qassam Brigades, who stopped them at a checkpoint, asking for identification. The Israeli team opened fire using a silenced gun. Following a high-speed car chase, the Israelis left via helicopter. Their abandoned Volkswagen car was then blown up by an Israeli fighter jet.

On Sunday, the IDF declassified the name of the fallen officer. It also released a photograph of the man, who has been identified as Lt. Col. Mahmoud Kheir el-Din, 41, from Galilee. A member of Israel’s Druze community, el-Din served in the Mista’arvim, a counter-terrorism unit of the IDF’s Special Operations division that is trained to capture or assassinate targets in enemy territory. El-Din joined the IDF’s Special Operations division in 2002, after having served as a platoon commander.

The IDF also provided limited details about the botched operation that led to el-Din’s death. It claims that el-Din “physically confronted” one of the Hamas operatives, thus giving another one of the Israeli soldiers the opportunity to open fire and kill seven Hamas members. El-Din was killed during the shootout, according to the IDF. The Israeli government said the decision to release el-Din’s identity was coordinated with his family. It added, however, that it does not plan to release further details about the botched operation.

Author: Ian Alen | Date: 17 May 2022 | Permalink

Russia targeted by unprecedented wave of cyber-attacks, experts say

Computer hackers AnonymousRUSSIAN STATE COMPANIES, BUSINESSES and individuals are being targeted in an unprecedented wave of attacks by digital assailants, according to observers, who say they are surprised by its ferocity. Since February of this year, hackers have accessed the personal financial data of pro-Kremlin oligarchs, stolen millions of internal emails stored on Russian government severs, and defaced high-profile websites across the nation. The Washington Post, which summarized the wave of attacks last Sunday, said they are being waged by hacker collectives, as well as common criminals. The paper claimed that the assailants are not connected to foreign governments.

According to observers, Russia currently tops the global list of targeted attacks by hackers for the first time since records began. Major targets include Russia’s media regulator, the Federal Service for Supervision of Communications, Information Technology and Mass Media, which anti-government activists blame for implementing Soviet-style censorship. Hackers have also attacked Russia’s state-owned broadcaster, known as VGTRK, as well the Russian intelligence and defense establishments. Tens of thousands of emails exchanged by senior VGTRK officials since 2013 were recently stolen and leaked in a massive data dump. Additionally, lengthy lists containing the names of alleged Russian intelligence officers, as well as of soldiers, have been leaked online by unknown hackers.

The attacks are led by political hacker collectives, including Network Battalion 65 (NB65), which announced its existence on Twitter just hours after Russian troops began to march toward Kyiv. The group is believed to have links to the international hacktivist collective Anonymous, and claims to have no ties to governments. Another hacker collective that is behind the attacks on Russia is a group calling itself AgainstTheWest. Despite its name, it is led by a group of pro-Western, “English-speaking hackers […] with intelligence backgrounds”, according to The Post. Attacks are also being perpetrated by smaller groups of hackers, some of them based in Ukraine, and by criminal groups, whose members are motivated by profit and are attacking Russian state targets at a time when the Kremlin appears vulnerable.

According to the paper, the Ukrainian government is not directly involved in these cyber-attacks. However, it has repeatedly endorsed attacks by hackers aimed at weakening the Russian state. Back in February, Ukraine’s Deputy Prime Minister and Digital Transformation Minister issued an open call for the formation of a “volunteer cyber army” to fight for Ukraine. As intelNews reported at the time, the Ukrainian government claimed that nearly 200,000 people had shown interest in joining the initiative. However, little has been mentioned since. The government of Ukraine maintains an “IT Army” channel on Telegram, where it frequently suggests Russian targets that pro-Ukrainian hackers should attack. However, any evidence of links between it and the wave of cyber-attacks that Russia has been experiencing remains speculative.

Author: Ian Allen | Date: 03 May 2022 | Permalink