Afghans who spied for CIA say they fear retaliation once US forces withdraw

Antony Blinken

AFGHAN CIVILIANS WHO WERE recruited by the United States Central Intelligence Agency as local assets say they fear retaliation by a resurgent Taliban once American forces withdraw from Afghanistan in September. Last April, US President Joe Biden announced that American troops would leave Afghanistan by September 11. The date will mark the 20th anniversary of the terrorist attacks of September 11, 2001, which caused Washington to send troops to Afghanistan in response.

The CIA has been a major component of America’s presence in Afghanistan over the past two decades. When operating in the Central Asian country, CIA officers have routinely relied on local people to collect intelligence, provide translation services, and guard its facilities and personnel. These local assets were typically paid in cash for their services, which were secret in nature and often life-threatening.

Now many of these local assets —possibly thousands— are apprehensive of the pending withdrawal of their American protectors from Afghanistan, and fear retaliation from a resurgent Taliban. According to The Wall Street Journal, these local CIA assets say that “their lives are now at risk”. A large number of them have submitted applications for a US Special Immigrant Visa. This is a State Department program that aims to offer protection to local people who have carried out “sensitive and trusted activities” on behalf of American government personnel abroad.

But the Special Immigrant Visa process is complicated and expensive, and is currently plagued by major delays. The Wall Street Journal reports that, even though the law stipulates Special Immigrant Visa requests must be processed within nine months, applications are currently taking between three to five years to be adjudicated. The Department of State says it is currently working through a backlog of 18,000 applications from around the world. The situation is particularly dire for Afghan CIA assets, says the paper, because many find it difficult to prove they ever worked for the CIA. The spy agency’s record-keeping was minimal throughout its time in Afghanistan, especially in the opening years of the conflict, according to the report. Furthermore, some local assets may not even be named in CIA documentation, so as to protect their identity.

In response to calls for faster processing of Special Immigrant Visa requests, US Secretary of State Antony Blinken (pictured) said earlier this month: “We’re determined to make good on our obligation to those who helped us, who put their lives on the line, put their families’ lives on the line working with our military, working with our diplomats”.

Author: Joseph Fitsanakis | Date: 23 June 2021 | Permalink

Germany arrests Russian PhD student on suspicion of spying for Moscow

University of Augsburg

A RUSSIAN DOCTORAL STUDENT in mechanical engineering, who is studying in a Bavarian university, has been arrested by German police on suspicion of spying for Moscow, according to official statements and reports in the German media. According to a press statement issued by the Federal Public Prosecutor General’s office in the city of Karlsruhe, the PhD student was arrested on Friday, June 18.

The student was subsequently identified by the German authorities only as “Ilnur N.”, in accordance with German privacy laws. On Monday, however, local media identified the suspected spy as Ilnur Nagaev, a doctoral candidate at the University of Augsburg, which is located 50 miles northwest of Munich. Nagaev reportedly works as a research assistant there, while pursuing his doctoral studies in mechanical engineering.

German authorities maintain that the suspect began working “for a Russian secret service” in early October of 2020, and possibly earlier. He is also accused of having met with an unidentified “member of a Russian foreign secret service” at least three times between October 2020 and June of this year. According to German federal prosecutors, Nagaev shared unspecified information with his alleged Russian handler, and received cash in return at the end of each meeting.

German police reportedly searched Nagaev’s home and work office looking for further clues about the case. In the meantime, a judge at the Bundesgerichtshof (Federal Court of Justice) in the Federal Court of Justice in Karlsruhe, which is Germany’s highest court on matters of ordinary jurisdiction, ordered that Nagaev be kept in pre-trial detention, pending a possible indictment. Neither the Russian nor the German federal governments have commented on this case.

Author: Joseph Fitsanakis | Date: 22 June 2021 | Permalink

No prison for Australian former spy who disclosed controversial espionage operation

Bernard Collaery

A FORMER AUSTRALIAN SPY, who prompted international outcry by revealing a controversial espionage operation by Canberra against the impoverished nation of East Timor, has been given a suspended prison sentence. The case against the former spy, known only as “Witness K.”, first emerged in 2013. It is believed that Witness K. served as director of technical operations in the Australian Secret Intelligence Service (ASIS), Australia’s foreign-intelligence agency.

In 2013, Witness K. revealed an espionage operation that targeted the impoverished Pacific island nation of Timor-Leste, also known as East Timor. He alleged that ASIS officers, disguised as a renovation crew, bugged an East Timorese government complex. The information gathered from the spy operation allegedly allowed the Australian government to gain the upper hand in a series of complex negotiations that led to the 2004 Certain Maritime Arrangements in the Timor Sea (CMATS) treaty. The treaty awards Australia a share from profits from oil exploration in the Greater Sunrise oil and gas field, which is claimed by both Australia and East Timor.

In 2013, the East Timorese government took Australia to the Permanent Court of Arbitration in The Hague, claiming that the Australian government was in possession of intelligence acquired through illegal bugging. The claim was supported by Witness K., who argued that ASIS’ espionage operation was both “immoral and wrong” because it was designed to benefit the interests of large energy conglomerates and had nothing to do with Australian national security. It is worth noting that Witness K. said he decided to reveal the ASIS bugging operation after he learned that Australia’s former Minister of Foreign Affairs, Alexander Downer, had been hired as an adviser to Woodside Petroleum, an energy company that was directly benefiting from the CMATS treaty.

Read more of this post

FBI thanks French police for high-profile arrest of Luxembourg’s former top spy

Luxembourg City

AGENTS OF THE UNITED States Federal Bureau of Investigation visited the northeastern French city of Nancy last week, reportedly to thank its local police force for arresting a former senior officer in Luxembourg’s spy agency. The case is said to be connected to a notorious cyptocurrency-based fraud scheme, which some claim may be the largest in history.

Frank Schneider headed the operations directorate of the Service de Renseignement de l’État Luxembourgeois (SREL), Luxembourg’s intelligence agency. Although he left the service in 2008, his name came up frequently in the context of a spy scandal that eventually brought down Luxembourg’s prime minister, Jean-Claude Juncker. The former spy was eventually acquitted of illegal conduct in that case —but he now appears to be in legal trouble of a different kind.

According to reports, US authorities have been looking for a man referred to in French media as “Frank S.” in connection to a massive Ponzi scheme that allegedly involves OneCoin, a Bulgarian-based cyptocurrency firm. British newspaper The Times has described the scheme as “one of the biggest scams in history”. It is believed that the OneCoin scheme defrauded victims around the world of over $4 billion.

Schneider was reportedly arrested on April 29 in Audun-le-Tiche, a small town on the French-Luxembourg border and not far from the Belgian and German borders. His arrest took place pursuant to an international warrant, which was later confirmed to have been issued by authorities in New York. It was reported at the time that Schneider’s arrest involved the deployment of members of Brigade de recherche et d’intervention —France’s equivalent of the Special Weapons And Tactics (SWAT) teams in the US.

The former spy is currently being held in detention at the Nancy-Maxéville prison, and is highly likely to be extradited to the US. American authorities have until June 28 to submit a formal extradition request to the Nancy office of the prosecutor.

Author: Joseph Fitsanakis | Date: 14 June 2021 | Permalink

Chinese state-linked cyber actor allegedly behind attack on global airline industry

Air India

A GROUP OF COMPUTER hackers with close links to the Chinese state are allegedly behind a wide-scale attack on the global airline industry, which includes espionage, as well as financial motives, according to a new report. If confirmed, the attack would constitute a global campaign against a single industry that is unprecedented in size, according to experts.

The most recent victim of this series of worldwide attacks is Air India, India’s government-owned flagship air carrier. In May of this year, the company was targeted by what officials described as “a highly sophisticated attack” that had begun over two months earlier. It was indeed in early February that the hackers had begun to collect information about Air India and trying to infiltrate its networks through a combination of methods, including spear-phishing. The resulting compromise affected the data of some 4.5 million of Air India’s passengers. Stolen information included passengers’ credit card details, as well as passport information, such as names and dates of birth.

But in a new report issued on Thursday, the Singapore-based cybersecurity firm Group-IB said that the methodology used by the perpetrators of the Air India attack resembled those used to hack other airline carriers around the world. Other victims have included Singapore Airlines, Malaysia Airlines, Finnair, as well as SITA, a Swiss-based provider of information technology services to airline operators in over 200 countries and territories around the world.

What is more, the Group-IB report claims “with moderate confidence” that the attacks on the global airline industry are being perpetrated by APT41. Also known as BARIUM, APT41 is a highly prolific group of computer hackers that is widely believed to be connected with the Chinese government. Since first appearing on the scene in 2006, APT41 has amassed a list of victims that include firms from almost every imaginable industry, including manufacturing, telecommunications, transportation, healthcare and defense. Some of its strikes are clearly financially motivated and include ransomware attacks. Others are espionage-related and point to the information needs of a nation-state —allegedly China.

In 2020, the United States Federal Bureau of Investigation added five members of APT41 to its “Most Wanted” list. The accompanying press statement accusing the five men of conducting “supply chain attacks to gain unauthorized access to networks throughout the world”, and attacking a host of companies on nearly every continent, including the Americas.

Author: Joseph Fitsanakis | Date: 11 June 2021 | Permalink

France suspends aid to Central African Republic over espionage charges

Juan Remy Quignolot

THE GOVERNMENT OF FRANCE has suspended all civilian and military aid to the Central African Republic (CAR), after authorities there charged a French national with espionage and conspiracy to overthrow the state. The charges were announced approximately a month after the arrest of Juan Remy Quignolot, 55 (pictured), who was arrested in CAR capital Bangui on May 10 of this year. Following Quignolot’s arrest, CAR police said they found more than a dozen cell phones, machine guns, ammunition and foreign banknotes in his hotel room.

Speaking to reporters in Bangui on Wednesday, the CAR’s attorney general, Eric Didier Tambo, said that Quignolot had been charged with espionage, illegal weapons possession, as well as conspiracy against the security of the state. According to CAR authorities, Quignolot has been providing training and material support to anti-government rebel groups for nearly a decade. However, CAR authorities have not specified for which country or group Quignolot performed his alleged activities.

The French Ministry of Foreign Affairs and the French embassy in Bagnui have not commented on Quignolot’s charges. When the French national was arrested in May, French Foreign Affairs Ministry officials said the move was part of “an anti-French campaign” orchestrated by Russia. Paris has been competing with Moscow for influence in this former French colony —a diamond- and gold-producing country of nearly 5 million people— which remains highly volatile following a bloody civil war that ended in 2016.

Earlier this week, France said it would immediately suspend its $12 million-a-year civilian and military aid to the CAR. The reason is that the African nation’s government had allegedly failed to take measures against “massive disinformation campaigns”, purportedly originating from Russia, which have “targeted French officials” in the CAR and the broader central African region. Despite suspending financial aid, France continues to maintain approximately 300 soldiers in the CAR. In recent years, however, France’s military presence in its former colony has been dwarfed by contingents of Russian military instructors, who are now training government forces.

Quignolot’s trial is expected to take place by December. Speaking about the Frenchman’s possible sentence, attorney general Tambo said on Wednesday that, “in cases of harming domestic security, you’re talking about lifetime forced labor”.

Author: Joseph Fitsanakis | Date: 10 June 2021 | Permalink

FBI built fake phone company in global wiretapping operation of historic proportions

Trojan Shield

THE UNITED STATES FEDERAL Bureau of Investigation built a fake telephone service provider for a secret worldwide operation that officials described on Monday as “a watershed moment” in law enforcement history. The operation, known as TROJAN SHIELD, began in 2018 and involved over 9,000 law enforcement officers in 18 countries around the world. When the existence of TROJAN SHIELD was announced in a series of official news conferences yesterday, officials said the operation had “given law enforcement a window into a level of criminality [that has never been] seen before on this scale”.

The operation centered on the creation of an entirely fake telephone service provider, known as ANØM. The fake firm advertised cell phones that were specially engineered to provide peer-to-peer encryption, thus supposedly making it impossible for government authorities to decipher intercepted messages or telephone calls between users. The FBI and law enforcement agencies in Australia and New Zealand used undercover officers to spread news about ANØM in the criminal underworld. The fake company’s modus operandi was to let in new users only after they had been vetted by existing users of the service. Within two years, there were nearly 10,000 users of ANØM around the world, with Australia having the largest number —approximately 1,500.

On Tuesday morning hundreds of raids were conducted in over a dozen countries, beginning with New Zealand and Australia, where over 500 raids were carried out, resulting in the arrests of 224 people. News reports suggest that over $45 million in cash has been seized in the past 24 hours in Australia alone, where law enforcement authorities dubbed the operation IRONSIDE. More raids have been taking place around the world, including in the United States. However, as raids were continuing into the evening, the FBI said it would not discuss the results of Operation TROJAN SHIELD until later today, Tuesday.

Speaking to reporters on Monday, Australian Prime Minister Scott Morrison described the undercover operation as “a watershed moment in Australian law enforcement history”, which would “echo around the world”. An early report on the operation, which was published by the San Diego Union Tribune in the United States, said the purpose of TROJAN SHIELD was two-fold: to dismantle organized criminal syndicates through evidence acquired from wiretaps, and to spread confusion and mistrust of encryption devices in the worldwide criminal underworld.

Author: Joseph Fitsanakis | Date: 08 June 2021 | Permalink

Russian spy activity has reached Cold War levels, say Germany’s intelligence chiefs

Thomas Haldenwang Bruno Kahl

RUSSIAN INTELLIGENCE ACTIVITY in Germany has reached levels not seen since the days of the Cold War, while espionage methods by foreign adversaries are now more brutal and ruthless, according to the country’s spy chiefs. These claims were made by Thomas Haldenwang, who leads Germany’s Agency for the Protection of the Constitution (BfV), and Bruno Kahl, head of the Federal Intelligence Service (BND), which operates externally.

The two men spoke to the Sunday edition of Die Welt, one of Germany’s leading newspapers. Their joint interview was published on June 6. Haldenwang told Die Welt am Sonntag that the presence of Russian spies on German soil reflects Moscow’s “very complex intelligence interest in Germany”. Accordingly, Russia has “increased its [espionage] activities in Germany dramatically” in recent years, said Haldenwang.

The counterintelligence chief added that Russia has a “large number of agents” that are currently active in German soil. Their goal is to try to “establish contacts in the realm of political decision-making”. One of many topics that the Kremlin is intensely interested at the moment is the future of Russia’s energy relationship with Germany, according to Haldenwang.

At the same time, Russia’s espionage methods are becoming “coarser” and the means that it uses to steal secrets “more brutal”, said the spy chief. Kahl, his external-intelligence colleague, agreed and added that Germany’s adversaries are “employing all possible methods […] to stir up dissonance between Western states”. Their ultimate goal is to “secure their own interests”, concluded Kahl.

However, despite Russia’s increased intelligence activity in Germany, the most serious threat to the security and stability of the German state is not Moscow, but domestic rightwing extremism, said Haldenwang. Notably, the German spy chief discussed the unparalleled rise of rightwing rhetoric on social media and websites. Such propaganda is being spread by people that he termed “intellectual arsonists”. Their “hate-filled messages” are essentially anti-democratic, said Haldenwang.

Author: Joseph Fitsanakis | Date: 07 June 2021 | Permalink

US government takes control of Internet domains used by SolarWinds hackers

Computer hacking

THE UNITED STATES GOVERNMENT has taken control of two Internet domains used last month in a large-scale phishing campaign by the same Russian-linked hacker group that was behind SolarWinds. The Department of Justice said on Tuesday it seized the two domains, theyardservice[.]com and worldhomeoutlet[.]com, on May 28, following a decision by a US court that authorized the action.

The large-scale attack was detected on May 25, and was delivered in over 3,000 emails sent from a compromised account belonging to the United States Agency for International Development (USAID). The compromised account was paired with the services of a legitimate email marketing company called Constant Contact. It was subsequently used to deliver phishing emails to the employees of over 150 organizations worldwide, most of them American.

The phishing emails featured an official USAID logo, beneath which was an embedded link to a purported “USAID Special Alert” titled “Donald Trump has published new documents on election fraud”. The link sent users to one of the two illicit subdomains, which infected victim machines with malware. The latter created a back door into infected computers, which allowed the hackers to maintain a constant presence in the compromised systems.

According to Microsoft Corporation, the hackers behind the phishing attack originated from the same group that orchestrated the infamous SolarWinds hack in 2020. The term refers to a large-scale breach of computer systems belonging to the United States federal government and to organizations such as the European Union and the North Atlantic Treaty Organization. The threat actor behind the attack is referred to by cybersecurity experts as APT29 or Nobelium, among other names.

Speaking on behalf of the US Department of Justice’s National Security Division, Assistant Attorney General John C. Demers said on Tuesday that the seizure of the two Internet domains demonstrated the Department’s “commitment to proactively disrupt hacking activity prior to the conclusion of a criminal investigation”.

Author: Joseph Fitsanakis | Date: 03 June 2021 | Permalink

Turkish spies reportedly kidnapped nephew of dissident cleric Fethullah Gülen in Kenya

Nairobi KenyaTURKISH SPIES ALLEGEDLY KIDNAPPED a nephew of dissident cleric Fethullah Gülen in Kenya and forcibly transported him to Turkey, according to reports in Turkish media. Citing “government sources”, Turkey’s state-owned news agency, Anadolu, said this week that Selahaddin Gülen had been “forcibly repatriated” to Turkey from abroad by officers of the National Intelligence Organization, known as MİT. But it did not specify when or where the alleged operation took place.

Subsequent reports suggested that Selahaddin Gülen’s wife, Serriye Gülen, posted a video on social media, in which she said the couple lived in Nairobi, Kenya, and that her husband, who worked as a school teacher, had disappeared on May 3. It was also reported that Gülen’s alleged kidnapping was soon afterwards confirmed by media outlets connected to the Gülen movement.

The Gülen movement consists of supporters of Muslim cleric Fethullah Gülen, who runs a global network of schools, charities and businesses from his home in the United States. The government of Turkey has designated Gülen’s group a terrorist organization and claims it was behind the failed 2016 coup against Turkey’s President, Recep Tayyip Erdoğan. Ever since the failed coup, Erdoğan’s government has fired or imprisoned over 200,000 government employees, which it accuses of being “Gülenists”. The cleric, who lives in the US state of Pennsylvania, denies Erdoğan’s accusations.

It is not clear whether Gülen’s nephew was kidnapped in a cover operation, or whether he was delivered to the MİT by the Kenyan authorities. Since the failed 2016 coup, the Turkish government has pressured numerous countries in the Americas, Europe, Asia and Africa to arrest and extradite alleged Gülenists. Kenya has so far refused to take action against individuals and institutions that Ankara claims are connected to the Gülen movement.

It is worth noting that in 1999 the MİT carried out a controversial covert operation in Kenya, which resulted in the kidnapping of Kurdish separatist militant Abdullah Öcalan. Öcalan, 74, is the leader of the Kurdistan Workers’ Party (PKK), which Turkey and several other countries have designated a terrorist organization. He remains imprisoned to this day.

Author: Joseph Fitsanakis | Date: 02 June 2021 | Permalink

We knew about the US-Danish spy collaboration. The revelations are still remarkable

DDIS DenmarkTHE FIRST CLAIMS OF an alleged secret collaboration between the signals intelligence agencies of the United States and Denmark surfaced in November of 2020. By January of this year, it was clear that the Danish government would, sooner or later, need to deal with the fallout of its controversial spy deal with Washington, under which Denmark enabled the US to spy on some of its closest European allies. Still, the news last weekend that Denmark helped the US spy on countries such as Germany, France, Sweden and Norway, is nothing short of remarkable, and has a huge symbolic significance that cannot be overlooked.

IntelNews regulars will recall that Lars Findsen, director of the Danish Defense Intelligence Service (FE, or DDIS in English) was unceremoniously “relieved of duty” in August of 2020. This was in response to a damning report by the Danish Oversight Board, known as TET, which is responsible for supervising the work of Denmark’s intelligence agencies. The Danish Ministry of Defense would not discuss the precise nature of the report, which at the time was believed to relate to vaguely described “improper intelligence collection practices”.

Then, in November of 2020 came news of an alleged secret collaboration between the DDIS and its American equivalent, the National Security Agency (NSA). According to Danish newspaper Jyllands-Posten and Danmarks Radio —Denmark’s public-service broadcaster— the agreement dated to 2008, and involved the use by the NSA of a number of fiber optic Internet cables that pass through Danish territory, in return for the DDIS being given access to the content of intercepted traffic. This collaboration resulted in the interception of information belonging to the governments of Germany, France, Sweden, Norway and Holland, among others.

It is said among intelligence practitioners that “there is no such thing as a friendly foreign intelligence agency”. There is also no known agreement not to spy on each other between the United States and several core countries of the Western alliance, such as Denmark, France, Holland, Norway, Germany, Belgium, Italy, Sweden, or Spain (it is rumored that a “no-spy clause” exists between Five Eyes participants). Technically speaking, therefore, espionage between European powers, or between them and the US, is not in violation of some sacred agreement. Read more of this post

China assesses emotions of subjects using AI technology that monitors skin pores

Xinjiang POLICE STATIONS IN CHINA are reportedly experimenting with a new technology that uses artificial intelligence to detect the emotions of subjects, and even monitors their skin pores, according to a source who spoke to the BBC. The source is a software engineer, whose identity has not been disclosed by the BBC. He said he helped install the controversial technology in a number of police stations in the Chinese region of Xinjiang.

Xinjiang, China’s most impoverished region, is home to 12 million Uighurs, most of whom are Muslims. The Chinese state is currently engaged in a campaign to quell separatist views among some Uighurs, while forcibly integrating the general population into mainstream Chinese culture through a state-run program of forcible assimilation. It is believed that at least a million Uighurs are currently living in detention camps run by the Communist Party of China, ostensibly for “re-education”. Xinjiang is often referred to as the world’s most heavily surveilled region.

According to the BBC’s Panorama program, patents filed by Chinese companies point to the development of facial recognition programs that can distinguish subjects by ethnicity, and appear to be “specifically designed to identify Uighur people”. Among them are artificial intelligence systems that are able to detect facial micro-expressions, so as to analyze the emotions of subjects. According to Panorama, some systems even monitor “minute changes” in skin pores on the face of subjects, as a means of detecting micro-expressions. The software then allegedly produces a pie chart that details a subject’s state of mind.

The BBC said it reached out to the Chinese embassy in London, which claimed to have “no knowledge” of these alleged surveillance programs. In a statement issued on Tuesday, the Chinese embassy said that “the political, economic and social rights and freedom of religious belief in all ethnic groups in Xinjiang are fully guaranteed”. It added that people in Xinjiang “live in harmony and enjoy a stable and peaceful life with no restriction to personal freedom”.

Author: Joseph Fitsanakis | Date: 25 May 2021 | Permalink

Belarussian spies were onboard commercial airliner diverted by force to Minsk

Ryanair

BELARUSSIAN INTELLIGENCE OFFICERS were allegedly onboard a commercial airliner that was en route to Lithuania, but was forcibly diverted to Minsk on Sunday, where a vocal Belarussian dissident was arrested. The dissident is 26-year-old Roman Protasevich, who is known as one of the most outspoken opponents of Belarus’ authoritarian President, Alexander Lukashenko.

Protasevich has been voicing his criticism of Lukashenko’s government on popular social-media outlets, such as Telegram. He has evaded charges of terrorism and incitement to violence in his home country by living in Poland, where he applied for political asylum in 2019. On Sunday, May 23, Protasevich was among the 171 passengers onboard Ryanair flight FR4978 from Athens, Greece, to Vilnius, Lithuania. However, while flying over Belarussian airspace en route to Vilnius, the commercial airliner was confronted by a Belarussian Air Force MiG-29 fighter jet, while the pilots were told by Belarussian ground control that a bomb threat had been issued against the plane.

The airplane was forcibly redirected to Minsk, despite the fact that there were several international airports that were physically closer. As soon as the aircraft landed, officers of the Belarussian State Security Committee, known as the KGB, boarded the plane and apprehended Protasevich. He is now under arrest in Minsk. It later surfaced that President Lukashenko had personally given instructions to the MiG-29 to prevent the Ryanair airplane from exiting Belarussian airspace.

Speaking on the breakfast show of Newstalk, an independent radio station in the Republic of Ireland, Ryanair Chief Executive Officer Michael O’Leary described Sunday’s incident as “a case of state-sponsored hijacking”. He added that according to Ryanair personnel onboard the aircraft, who witnessed the incident, Belarussian KGB officers were “onboard the plane when it took off from Athens” and participated in forcibly arresting Protasevich once the airplane had landed in Minsk.

Protasevich appeared on a video issued by the Belarussian authorities late on Sunday. He is reportedly facing 12 years in prison if convicted of inciting riots. However, he faces the death penalty if convicted of acts of terrorism.

Author: Joseph Fitsanakis | Date: 25 May 2021 | Permalink

US Justice Department and CIA may intervene in Saudi lawsuit to protect secrets

Saad al-Jabri

THE UNITED STATES DEPARTMENT of Justice and the Central Intelligence Agency may intervene in a civil lawsuit filed by an exiled Saudi spy against the oil kingdom’s de facto ruler, in order to protect state secrets. In a 106-page lawsuit, filed last year with the US District Court in Washington, DC, Dr. Saad al-Jabri claims that Saudi Arabia’s de facto ruler, Crown Prince Mohammed bin Salman, dispatched members of his “personal mercenary group”, known as the Tiger Squad, to North America, in order to assassinate him.

Al-Jabri was a courtier of Crown Prince Muhammad bin Nayef, grandson of Saudi Arabia’s founding monarch, King Abdulaziz. Bin Nayef, who was widely expected to be Saudi Arabia’s next king, eventually appointed al-Jabri Minister of State and made him his senior adviser on matters of security and intelligence —in essence his spy chief. But al-Jabri’s standing changed suddenly in 2015, when King Abdullah died and was succeeded by King Salman. Salman then named his son, Mohammed bin Salman, as his successor, effectively usurping al-Jabri’s mentor and protector, Prince bin Nayef. Within weeks, al-Jabri had been fired, while his patron, bin Nayef had gone under house arrest. Fearing for his life, al-Jabri took his eldest son, Khalid, and escaped to Canada in the middle of the night. They remain there to this day.

Bin Salman’s lawyers have dismissed al-Jabri’s lawsuit as baseless, and accuse the former spy chief of embezzling $3.4 billion from Saudi state coffers under the pretense of funding security programs. Al-Jabri’s lawyers have told the court that an “examination of the counterterrorism and national security activities of the United States government” may be necessary in order to demonstrate that their client has not embezzled state funds.

This development has US government officials worried, according to The Washington Post’s well-sourced David Ignatius. He reports that, in April of this year, the US Department of Justice filed a document in a federal court in Massachusetts, in which it outlines its plans to intervene in al-Jabri’s lawsuit against bin Salman. According to the Department of Justice, al-Jabri’s legal team may intend “to describe information concerning alleged national security activities”, which is something the US government would like to prevent.

According to Ignatius, the Department of Justice could invoke the rarely used “state secrets privilege”, which allows the US government to refuse to disclose information when ordered to do so by a court of law, if there is a “reasonable danger” that doing so could threaten US national security. Ignatius added that the Central Intelligence Agency is also looking into whether it could resist a judge’s orders to disclose information pertaining to the case of al-Jabri.

Author: Joseph Fitsanakis | Date: 24 May 2021 | Permalink

German army officer led double life as Syrian immigrant, planned to kill politicians

Franco AA GERMAN ARMY LIEUTENANT, who led a double life as a fake Syrian refugee, has gone on trial in Frankfurt, accused of planning to kill German politicians so as to provoke anti-Arab sentiment among Germans. The man has been identified by the German media as “Franco A.”, 32, due to strict German privacy laws. He lived in France, where he served in the Franco-German Brigade, an elite military force that combines units from the French and German armies, and is meant to symbolize Franco-German rapprochement in the postwar era.

In 2016, Franco A. approached German authorities and pretended to be a French-speaking Christian from Syria, having first dyed his beard black and darkened his complexion using make-up. Using the name “David Benjamin”, he convinced German immigration officials to provide him with temporary identity papers and grant him asylum in Germany. He also received a monthly allowance from the German state. In 2017, however, Franco A. was arrested in Vienna while trying to retrieve a loaded pistol he had hidden in a public bathroom. When searching his room at the Franco-German Brigade barracks, police discovered Nazi-era memorabilia. Further searches at his parents’ home in Germany uncovered stockpiles of ammunition and explosives.

German prosecutors now allege that Franco A. belonged in a secretive network of far-right German survivalists, whose members planned to take armed action on a day they referred to as “Day X”, which would mark the beginning of a civil war in Germany. Additionally, Franco A. is accused of having stolen ammunition from his barracks, and of keeping a list of possible victims for assassination. The latter included the German Foreign Affairs Minister Heiko Maas and Claudia Roth, a member of the German Green Party, who currently serves as Vice-President of the Bundestag —Germany’s federal parliament.

But the plot thickened once German authorities realized that Franco A.’s fingerprints matched exactly those of the Syrian immigrant, David Benjamin. They then realized Franco A. and David Benjamin were one and the same person. According to government prosecutors, Franco A. planned to kill at least one senior German political figure, then leave the gun bearing his fingerprints at the scene of the crime. His goal was to have the fingerprints match those of his fake Syrian identity, and in doing so stir anti-Arab sentiment among the German population.

During his court appearance on Thursday, Franco A. denied being a neo-Nazi, and claimed that the reason he posed as a Syrian refugee was because he wanted to “expose the flaws in Germany’s asylum system”. He faces 10 years in prison, if convicted.

Author: Joseph Fitsanakis | Date: 21 May 2021 | Permalink