CIA warned Tunisian officials about murder of opposition politician
September 23, 2013
By JOSEPH FITSANAKIS | intelNews.org
The Tunisian government has admitted that it received advance warning by “an external intelligence source” of an assassination operation against a popular opposition figure. The politician, Mohammed Brahmi, a widely respected member of the country’s National Constituent Assembly, was gunned down 11 days after the alleged warning was received. His death, in July of this year, plunged the country into political chaos, which continues to dominate Tunisian politics today. Speaking to lawmakers on Thursday, Tunisia’s Minister of the Interior, Lotfi Ben Jeddou, said the warning had been received on July 15, 2013. He refused to identify the source of the warning, but Tunisian media speculated that it was most likely the United States Central Intelligence Agency (CIA). The warning was included in a memorandum, which stated that Brahmi was likely to be targeted by “Salafist elements” because of his secular and liberal political beliefs. The minister said that the warning contained no “further clarification”, but added that the absence of details in the memorandum did not justify the failure of the Tunisian security establishment to adequately respond to it. Brahmi, died on July 25 after being shot over a dozen times at close range outside his house in the al-Gazala neighborhood of Tunisian capital Tunis. On Saturday, two days after Minister Ben Jeddou’s revelation, Tunisian newspaper Al Maghreb published a leaked memorandum that contains a summary of the warning about Brahmi’s killing. The leaked summary, which is signed by Tunisia’s Director General of National Security, Mustafa Ben Amor, appears to be dated July 15, 2013, exactly 11 days before Brahmi’s assassination. It describes a warning issued by a CIA official, concerning credible threats to Brahmi’s life. Read more of this post















Fake URL shortening service was part of British online spy operation
August 2, 2016 by Joseph Fitsanakis 2 Comments
According to the leaked documents, the website, lurl.me, was devised by a specialist until of the Government Communications Headquarters (GCHQ), Britain’s intelligence agency that collects signals intelligence. The unit, called Joint Threat Research Intelligence Group (JTRIG), devised the website as part of an operation codenamed DEADPOOL. The leaked documents state that the purpose of the website was to operate as a “shaping and honeypot” tool, by helping disseminate messages in support of the protests while at the same time allowing the GCHQ to monitor the protesters’ online activities. Lurl.me first appeared in June 2009 as a self-described “free URL shortening service”, using the slogan: “we help you get links to your friends and family fast”. It was used repeatedly on Twitter and other social media platforms to spread messages against the government of Iran. But the vast majority of social media accounts that made use of the website, like @2009iranfree, were operational only for a short period of time, had few followers, and ceased all activity at the end of the Iranian Green Movement. By that time, hardly anyone was using lurl.me. But the website made its appearance again on social media in April of 2011, with messages against the government of Syria. According to Vice’s Motherboard website, Tweets using the lurl.me service appeared to be active only between 9 a.m. and 5 p.m. UK time, and only on weekdays.
Both in 2009 and 2011-2013, lurl.me was used to instruct anti-government activists on how to avoid being monitored by the authorities. Some links contained instructions on how to access the Internet via satellite. Others provided directions on using proxies to access websites that were blocked by the authorities. At the same time, however, the documents leaked by Snowden show that the GCHQ also used the service to track the activities of anti-government activists who clicked on the lurl.me links, and even to ‘deanonymize’ (=to establish the real identity) of these users.
IntelNews first reported on JTRIG in February 2014, when its existence was first revealed by Snowden. The specialist unit has been associated with targeting self-described ‘hacktivist’ groups like Anonymous or LulzSec, using malware, social engineering, and other techniques. JTRIG also appears to have conducted online intelligence operations against the government of Argentina.
Motherboard reports that lurl.me was last used in November 2013, shortly after Snowden began leaking files from his secret hiding place in Russia. Motherboard said it contacted GCHQ for a reaction to the lurl.me allegations, but the agency said it would “not comment on intelligence matters”.
► Author: Joseph Fitsanakis | Date: 02 August 2016 | Permalink
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with 2009 Iranian presidential election protests, Arab Spring, GCHQ, GCHQ Joint Threat Research Intelligence Group, Iran, News, operation DEADPOOL, Twitter, UK