Germany summons US ambassador following arrest of CIA spy

BND headquarters in BerlinBy JOSEPH FITSANAKIS | intelNews.org
Authorities in Germany have summoned the American ambassador to Berlin following the arrest of a German intelligence officer who was apprehended last week on suspicion of spying for the United States. The man, who has not been named, is suspected of passing classified government information to American intelligence operatives on a variety of subjects. His most recent undertakings are said to have targeted activities of a German parliamentary committee investigating US espionage against Germany. The episode is expected to further strain relations between the two allies, which were damaged by revelations last year that the National Security Agency, America’s signals intelligence organization, had bugged the telephone of German Chancellor Angela Merkel. The revelation, which was made public by Edward Snowden, an American defector to Russia who had previously worked for the NSA, showed that Chancellor Merkel had been targeted as part of a wider US spy operation against Germany. The revelations sparked the establishment of a nine-member parliamentary committee that is tasked with evaluating Snowden’s revelations and proposing Germany’s response. It appears that the man arrested, who is believed to have been secretly employed by the Central Intelligence Agency, tried to spy on the activities of the committee on behalf of his American handlers. According to German media reports, the man, who is said to be 31 years old, is a “low-level clerk” at the Bundesnachrichtendienst, or BND, Germany’s external intelligence agency. According to Der Spiegel newsmagazine, he is believed to have spied for the CIA for approximately two years, and to have supplied the American spy agency with around 200 classified German government documents in exchange for around €25,000 —approximately $30,000. Read more of this post

UK spy agency sued by Internet providers over malware attacks

GCHQ center in Cheltenham, EnglandBy JOSEPH FITSANAKIS | intelNews.org
A group of Internet service providers from North America, Europe, Asia and Africa have filed a lawsuit against Britain’s foremost signals intelligence agency, accusing it of hurting their business by spying on them. The legal complaint was filed against the Government Communications Headquarters (GCHQ), the British government agency tasked with communications interception, which also provides information assurance to both civilian and military components of the British state. Service providers from the United States, United Kingdom, Germany, Netherlands, South Korea and Zimbabwe are listed as plaintiffs in the complaint, which was filed on Wednesday in a court in London. The legal action against the spy agency is based on articles that surfaced in the international press last year. They alleged that GCHQ targeted Belgium’s largest telecommunications service provider Belgacom. The revelations surfaced first in September of 2013 in Flemish newspaper De Standaard. The paper claimed that Belgacom’s mainframe computers had been deliberately infected by an “unidentified virus”, which had specifically targeted telecommunications traffic carried by Belgacom’s international subsidiaries. De Standaard further claimed that the scope and technical sophistication of the operation pointed to a state-sponsored agency as the culprit. Further revelations about the Belgacom malware attacks were made in German newsmagazine Der Spiegel in November of last year, pointing to GCHQ as the agency behind the operation. The allegations originated in information provided by Edward Snowden, an American defector to Russia who used to work for GCHQ’s American equivalent, the National Security Agency. In their lawsuit, the Internet service providers allege that, regardless of whether they were themselves targeted by GCHQ in a manner similar to that of Belgacom, the British spy agency effectively compromised the integrity of their industry. It did so, they argue, by allegedly targeting employees of telecommunications service providers, by infecting telecommunications networks with malware, by Read more of this post

Opinion: Iraq is like South Vietnam in 1963 – the US should walk away

Diem and LodgeBy JOSEPH FITSANAKIS* | intelNews.org
As I watch the dramatic collapse of the Federal government of Iraq, I keep telling myself that I cannot possibly be the only person noticing the remarkable political resemblance between the Iraq of 2014 and the South Vietnam of 1963. Just like government of Iraq today, the Republic of South Vietnam, which had been set up with direct American support flowing France’s exit from Indochina in 1954, faced increasing domestic opposition that was both political and religious. In Iraq today it is the Sunni Muslims who have taken up arms against the Shiite-controlled government of Prime Minister Nouri al-Maliki. The South Vietnamese President, Ngo Dinh Diem, a westernized Vietnamese Catholic, whose family had been proselytized to Christianity in the 17th century, was shunned by South Vietnam’s Buddhist majority. The latter became increasingly agitated in opposition to the American supported government in Saigon, which they saw as alien and fundamentally anti-Vietnamese. Diem’s response was to intensify internal repression in South Vietnam. He unleashed the country’s secret police, controlled by his shadowy brother, Ngo Dinh Nhu, against the Buddhist community. In the summer of 1963, Buddhist monks began resorting to self-immolation in a desperate attempt to draw public attention to their repression by Diem’s paramilitaries. Nhu’s wife, the fashionable Madame Nhu, shocked public opinion by dismissing the incidents as just some “drugged monks barbecuing themselves”. Washington immediately distanced itself from her comments, and increasingly from Diem.

In the summer of 1963, President John F. Kennedy, a personal friend of Diem, publicly accused the government in Saigon of having “lost touch” with the Vietnamese people and condemned the harsh repression of the Buddhist community. In private, Kennedy had gone a step further, instructing the Central Intelligence Agency and his Ambassador to Vietnam, Henry Cabot Lodge, to begin consulting with the South Vietnamese military about the possibility of deposing Diem. By that time, the Diem regime had become immensely unpopular in South Vietnam. Read more of this post

Analysis: Should government spies target foreign firms?

CyberespionageBy JOSEPH FITSANAKIS | intelNews.org
Last month, the government of the United States indicted five officers of the Chinese People’s Liberation Army with conspiracy to commit computer fraud, economic espionage, and theft of trade secrets, among other charges. In indicting the five PLA officers, the US Department of Justice went to great pains to ensure that it did not accuse the suspects of engaging in cyberespionage in defense of China’s national security. What sparked the indictments was that the accused hackers allegedly employed intelligence resources belonging to the Chinese state in order to give a competitive advantage to Chinese companies vying for international contracts against American firms. In the words of US Attorney General Eric Holder, the operational difference between American and Chinese cyberespionage, as revealed in the case against the five PLA officers, is that “we do not collect intelligence to provide a competitive advantage to US companies, or US commercial sectors”, whereas China engages in the practice “for no reason other than to advantage state-owned companies and other interests in China”. I recently authored a working paper that was published by the Cyberdefense and Cybersecurity Chair of France’s Ecole Spéciale Militaire de Saint-Cyr, in which I argued that the American distinction between public and private spheres of economic activity is not shared by PLA. The Chinese see both state and corporate cyberespionage targets as fair game and as an essential means of competing globally with the United States and other adversaries. In the paper, I argue that Beijing sees the demarcation between state and private economic activity as a conceptual model deliberately devised by the US to disadvantage China’s intelligence-collection ability. Read more of this post

UK military scrambling to rehire retired Russian-language analysts

Russian troops in UkraineBy JOSEPH FITSANAKIS | intelNews.org
The crisis in Ukraine is causing the British military to reach out to hundreds of retired Russian-language analysts who left the service at the end of the Cold War, according to media reports. British newspaper The Daily Telegraph said on Saturday that Russia’s actions in the Ukraine had exposed significant shortages of Russian-language analysts in the British Armed Forces. The paper said it had seen internal government documents that detailed efforts by military officials to contact associations of retired intelligence personnel in search of qualified Russia experts. The article referenced one recent memorandum from an unnamed senior officer in a military intelligence brigade, which asks retired military personnel to help by contacting retired Russian-language analysts, most of whom are now in their 60s. Other documents suggest that, in addition to analysts, the British military is in need of experts that can help monitor and translate information collected from open-source Russian information channels. The Telegraph places the blame for the shortage on budget cuts implemented by successive British governments on the nation’s Armed Forces. It also faults the defense and security agencies’ “recent focus on the Middle East and Asia”, which is said to have occurred at the expense of Russian linguistic and analytical expertise. The article quotes an unnamed “intelligence source” as saying that Britain’s Ministry of Defense used to offer “extremely good” Russian-language courses, but that “after 9/11” a focus on Arabic displaced Russian and other languages associated with the Cold War. There are also complaints by Russian experts in the British Army that they were “openly derided as being nothing more than a ‘language club’” in the years following 9/11. Read more of this post

Former KGB officer says Snowden was ‘tricked into going to Russia’

Boris KarpichkovBy JOSEPH FITSANAKIS | intelNews.org
A former major in the Soviet KGB has told the British press that a team of Russian intelligence operatives posing as diplomats “tricked” American intelligence defector Edward Snowden into going to Moscow. Many believe that Snowden, a former computer expert for the United States Central Intelligence Agency and the National Security Agency, was recruited by Russian intelligence before defecting to Moscow in June 2013. But former Soviet and Russian intelligence operative Boris Karpichkov has said in an interview that Snowden never intended to defect to Russia, but was lured there by a team of Russians spies. Karpichkov was a major in the Soviet KGB and its domestic-security successor, the FSB, where he worked for 15 years. In the mid-1990s, however, he gradually fell out with his employer and was imprisoned for several months before managing to leave his homeland using one of several false passports that had been supplied to him by Russian intelligence. In 1998 he entered Britain, where he lives with his family today, having been granted political asylum. He told British tabloid newspaper Sunday People that Snowden had first attracted the attention of Russian intelligence in 2007, while he was posted by the CIA to Geneva, Switzerland. During his time there, Snowden posed as a diplomat while maintaining the security of the CIA’s computer facilities located on Swiss soil. According to Karpichkov, the SVR, the post-Soviet successor of the KGB’s foreign-intelligence department, first opened a file on Snowden at that time, and kept updating it for six years, having identified the American computer technician as a “potential defector”. The former KGB operative told the British newspaper that the SVR moved quickly after it emerged that Snowden had abandoned Hawaii, where he had been posted by the NSA, and was hiding in a Hong Kong hotel. He was eventually accosted by a group of SVR spies posing as Russian diplomats. The group managed to persuade him, says Karpichkov, that the Russian government would be able to offer him protection in Moscow while he made up his mind over which country to apply to for political asylum. Read more of this post

Is Estonia’s Russian counterintelligence program the world’s best?

EstoniaBy JOSEPH FITSANAKIS | intelNews.org
Until not so long ago, the former Soviet Republic of Estonia was known as a playground for Russian intelligence. The tiny Baltic state, with a population of just under 1.4 million, a fourth of whom are ethnic Russians, struggled to build its security and intelligence infrastructure following its emergence from communism. Some of the country’s low points during that process include the infamous 2007 cyberattacks, which are believed to have been orchestrated by Moscow, and which kicked the entire country off the World Wide Web for over a week. A year later, authorities in Tallinn announced the arrest of Herman Simm, a senior official at the Estonian Ministry of Defense, who was apprehended along with his wife for spying on behalf of Russian intelligence for nearly 30 years. Since that time, however, Tallinn has been able to transform its Russian counterintelligence program into something resembling the envy of the world, according to Foreign Affairs columnist Michael Weiss. In an intriguing analysis published on Tuesday, Weiss argues that Estonia’s claim to fame in the counterintelligence world centers on its initiative in hosting the North Atlantic Treaty Organization’s Cooperative Cyber Defense Center of Excellence, which was founded in response to the 2007 cyberattacks. But, says Weiss, much more quietly, the tiny Baltic state has become a global leader in “old-fashioned counterintelligence” directed against Russian spy operations on its territory. He quotes one observer as saying that Estonia’s Russian counterintelligence program “is now better by a long way than that of any other country in Europe”. John Schindler, a professor at the United States Naval War College and former analyst at the National Security Agency, tells Weiss that, unlike the Federal Bureau of Investigation, Estonia’s counterintelligence service, Kaitsepolitseiamet, known as KaPo, “intuitively understands Russian intelligence culture”. The agency, says Schindler, used the Simm case as an impetus to upgrade its offensive and defensive counterintelligence posture. This effort led to the well-publicized arrests of Aleksei and Viktoria Dressen, as well as Vladimir Veitman, all Estonian citizens who had been spying for Russia for many years. Read more of this post

Location of UK’s ‘above top-secret’ Middle East spy base revealed

GCHQ's Seeb spy base in OmanBy JOSEPH FITSANAKIS | intelNews.org
The location of a British listening base in the Middle East, which is classified by the British government as “three levels above top-secret”, has been revealed by a technology website. The information had been previously leaked by American defector Edward Snowden to several British newspapers, but the latter refrained from airing it following pressure by the British government. However, the highly classified material was published on Tuesday in online technology review The Register. The author of the revelatory article is Duncan Campbell, a longtime investigative journalist and researcher who has been reporting on intelligence matters for over three decades. In his article, Campbell alleges that the secret British spy base is located in Seeb, in northeast Oman, and is operated by the General Communications Headquarters (GCHQ), Britain’s signals intelligence agency. The base’s primary operational goal is to monitor undersea telecommunications cables serving the Arabian Sea and the Persian Gulf, which pass through the Strait of Hormuz. According to Campbell, the listening facility was initially constructed with British funding as a joint intelligence center with the Omani authorities, with the purpose of intercepting the signals of civilian communications satellites orbiting in the wider region. But it has since developed into one of three high-value GCHQ locations in Oman (referred to as Overseas Processing Centres —OPCs). The three locations, codenamed TIMPANI, GUITAR and CLARINET, form part of a region-wide communications interception program codenamed CIRCUIT. Through CIRCUIT, London has allegedly managed to gain access to nearly a dozen underwater cables passing through the Strait of Hormuz, which link a host of Arab countries, including Iraq, Iran, Saudi Arabia, the United Arab Emirates and Kuwait. Interestingly, GCHQ relies on the close cooperation of several telecommunications service providers to meet its interception targets, says Campbell. These include British Telecom, codenamed REMEDY in internal GCHQ documents, and Vodafone, the world’s second-largest mobile telecommunications company, which GCHQ has codenamed GERONTIC. Read more of this post

Brussels Jewish museum shooting spree ‘could be tied to intelligence’

Shooting aftermathBy JOSEPH FITSANAKIS | intelNews.org
Belgian police investigating last weekend’s shooting spree at a Jewish heritage center in Brussels do not rule out the possibility that the attack may have been part of an intelligence operation directed against Israeli agents. The incident occurred on Saturday at the Musee Juif de Belgique, located in the heart of the Belgian capital. A man wearing a dark-colored jacket, baseball cap and sunglasses walked in the museum in broad daylight, pulled a Kalashnikov rifle out of a bag, and opened fire, killing three people. A fourth person remains in critical condition. Observers initially classified the shooting as an anti-Semitic attack. There is speculation, however, that the bloody assault may have been a targeted assassination that was part of a wider intelligence war between Israel, Iran, and Lebanese-based Shiite militant group Hezbollah. Several counterterrorism experts, including Claude Moniquet, Co-Director of the European Strategic Intelligence and Security Center, have expressed the view that the shooter appeared to be a trained professional. Referring to publicly available surveillance footage of the shooting, Moniquet said that the perpetrator of the attack, who remains at large, behaved as “an unemotional murderer, someone who had already witnessed death and perhaps killed before”. Moniquet’s comments came shortly after an article by Amir Oren, military affairs correspondent for Israeli daily Ha’aretz, in which he suggested that the attack may have been an act of retaliation by Iranian or Hezbollah operatives, who have been engaged in a lengthy tit-for-tat war with Israeli intelligence since at least 2009. Oren noted that two of the victims of the attack, Emmanuel and Mira Riva , were civil service accountants who had spent years in government service. Read more of this post

Spain shelves charges against French alleged ‘assassin’ spies

Philippe RondotBy JOSEPH FITSANAKIS | intelNews.org
A court in Spain has quietly shelved charges against two French spies who were caught in Barcelona with a custom-designed sniper rifle. The two men were detained in the Catalonian town of Manresa in April of 2002. The Audi car in which they were riding was stopped at a checkpoint manned by members of the Mossos d’Esquadra, the Catalan regional police, who promptly searched it. In the back of the car, police officers found a large PVC tube that contained a sniper rifle complete with a laser telescopic light and a silencer. The two men carried French travel documents identifying them as “Christian Piazzole” and “Rachid Chaouati”. Piazzole’s documents were found to be false, and there were suspicions that Chaouati’s may also have been forged. Spanish authorities concluded that the two men, who admitted they were officers of France’s General Directorate for External Security (DGSE), were in Spain to conduct an assassination. In a words of a state prosecutor in Barcelona, the DGSE spies had come to Spain “to kill”. Their arrest prompted an emergency visit to Madrid of a high-level French government delegation headed by General Philippe Rondot, a former senior intelligence officer at the DGSE. Rondot told Spanish officials that the two men were “on a training exercise”. In October of 2002, the Spanish Ministry of Interior commanded the Office of the State Attorney General to grant the two French spies “provisional release”, based on the rationale that there had been no victims involved in the case. Piazzole and Chaouati were promptly released after Rondot provided personal assurances that they would return to Spain to attend their trial for illegal weapons possession in early 2004. The charges carried a maximum sentence of seven years. It was said at the time that, in exchange for the two spies’ release, Paris pledged to continue to assist Spanish intelligence in their efforts against the Basque separatist militants of ETA, and agreed to extradite a number of ETA members serving time in French prisons. However, soon after their release, Piazzole and Chaouati vanished. They were found to be in contempt of court after they failed to return to Spain for their 2004 trial, as agreed. Since that time, Spanish media have sought to solve the mystery of the two French spies, but have been met with a wall of silence from Spanish and French authorities. Read more of this post

Analysis: The Politics Behind the Thailand Coup Explained

Thai troops in the streets of BangkokBy JOSEPH FITSANAKIS* | intelNews.org
In the early hours of Thursday, the Thai government of acting caretaker Prime Minister Niwatthamrong Boonsongpaisan, which had been appointed on May 7 of this year, was dissolved. Executive rule is now in the hands of the Peace and Order-Maintaining Command (POMC), led by Army General Prayuth Chan-ocha and composed of the commanders-in-chief of the Royal Air Force, Navy and Police. The 2007 Constitution has been suspended and the leaders of all political factions have been arrested. The POMC has taken over all broadcasting facilities in the country and has warned social media hosts that they are not allowed to publish content that is “misleading” to the public, “escalates political conflict” or “opposes the mandate of the POMC”. Thai military officials continue to deny that this is a coup, but the actions of the POMC reflect textbook tactics of juntas, down to the suspension of regular broadcasts and their replacement with patriotic songs and military marches.

None of this is surprising, given Thailand’s turbulent political history. Since 1932, when the country became a constitutional monarchy, there have been nearly 30 military-led mutinies, rebellions, and armed insurrections in the country, including 18 attempted coups, 12 of them successful. The most recent coup prior to last Thursday’s was in 2006, when the armed forces toppled the legally elected government of Prime Minister Thaksin Shinawatra, who was accused of abusing his power and disrespecting the country’s monarchy. In January of this year, political forecaster Jay Ulfelder, who served for a decade as research director of the United States government’s Political Instability Task Force, predicted that Thailand was close to a military coup. He published a mathematical model analyzing the likelihood of a military coup materializing in most of the world’s countries in 2014. Notably, Thailand was the only non-African nation among the ten candidates that topped Ulfelder’s list.

Read more of this post

The mysterious Chinese unit behind the cyberespionage charges

Shanghai, ChinaBy JOSEPH FITSANAKIS | intelNews.org
On Monday, the United States government leveled for the first time charges against a group of identified Chinese military officers, allegedly for stealing American trade secrets through cyberespionage. The individuals named in the indictment are all members of a mysterious unit within the Chinese People’s Liberation Army (PLA) command structure, known as Unit 61398. It is estimated that the unit has targeted at least 1,000 private or public companies and organizations in the past 12 years. Western cybersecurity experts often refer to the group as “APT1”, which stands for “Advanced Persistent Threat 1”, or “Byzantine Candor”. It is believed to operate under the Second Bureau of the PLA’s General Staff Department, which is responsible for collecting foreign military intelligence. Many China military observers argue that Unit 61398 is staffed by several thousand operatives, who can be broadly categorized into two groups: one consisting of computer programmers and network operations experts, and the other consisting of English-language specialists, with the most talented members of the Unit combining both skills. Computer forensics experts have traced the Unit’s online activities to several large computer networks operating out of Shanghai’s Pudong New Area district, a heavily built neighborhood in China’s largest city, which serves as a symbol of the country’s rapid industrialization and urbanization. Among other things, Unit 61398 is generally accused of being behind Operation SHADY RAT, one of history’s most extensive known cyberespionage campaigns, which targeted nearly 100 companies, governments and international organizations, between 2006 and 2011. The operation is believed to be just one of numerous schemes devised by Unit 61398 in its effort to acquire trade secrets from nearly every country in the world during the past decade, say its detractors. American sources claim that the PLA Unit spends most of its time attacking private, rather than government-run, networks and servers. As the US Attorney General, Eric Holder, told reporters on Monday, Unit 61398 conducts hacking “for no reason other than to advantage state-owned companies and other interests in China, at the expense of businesses here in the United States”. But The Washington Post points out that the recent revelations by US intelligence defector Edward Snowden arguably make it “easier for China to dismiss” Washington’s charges, since they point to Read more of this post

New details about FBI probe that led to Chinese spy’s conviction

Dongfan "Greg" ChungBy JOSEPH FITSANAKIS | intelNews.org
Some of our longtime readers will recall the case of Dongfan “Greg” Chung, a Chinese-born American engineer for Boeing, who was convicted in 2009 of passing US space program secrets to China. The case is arguably far more important than it might have seemed at the time, as Chung was technically the first American to be jailed for economic espionage. Many at the Federal Bureau of Investigation view the Chung conviction as a landmark case for providing clear legal proof of Chinese espionage in the US. Little is known, however, about how the FBI managed to uncover Chung’s espionage activities, which are believed to have gone on for nearly three decades. In the latest issue of The New Yorker, Yudhijit Bhattachargjee reveals for the first time the fascinating background of how the Bureau got to Chung. It did so through another American engineer of Chinese origin, named Chi Mak. Unlike Chung, who was ideologically committed to Maoism and was recruited by Chinese intelligence after immigrating to the US, Mak was an accredited intelligence operative who was allegedly specifically planted in the US by the Chinese. He came to America from Hong Kong in 1979 and worked for California-based defense contractor Power Paragon. He almost immediately began stealing secrets relating to US Navy systems. The FBI first started monitoring Mak and his wife, Rebecca, in 2004, following a tip. The effort evolved in one of the Bureau’s biggest counterintelligence cases, involving elaborate physical and electronic surveillance that lasted for nearly 18 months. During that time, FBI and Naval Criminal Investigation Service agents installed surveillance cameras outside the Maks’ residence, followed the suspects around, and monitored their telephone calls. Eventually, the surveillance team managed to acquire a warrant allowing them to clandestinely enter the Maks’ home and conduct a secret search. The nondestructive entry team discovered numerous stacks of secret documents “some two or three feet high” all around the suspects’ house. Among the findings was an address book containing the names of other engineers of Chinese origin living in the state of California. That, says Bhattachargjee, was the first time the FBI came across Chung’s name. Read more of this post

US Secretary of Defense ‘not aware’ of Israel spying on America

By JOSEPH FITSANAKIS | intelNews.orgChuck Hagel, Barack Obama, John Brennan
The supreme official of the United States Department of Defense has said he is “unaware of the facts” behind recent media reports that Israel is aggressively spying on America. Chuck Hagel, a former Republican Senator who assumed the leadership of the Pentagon in 2013, is on a three-day official visit to Israel, where he is scheduled to hold meetings with Israeli military and security officials. He was responding to a question posed by an Israeli reporter about allegations, made by American newsmagazine Newsweek on Tuesday, that Israel’s spies “have gone too far” in targeting American interests. In an article published in Newsweek last week, veteran intelligence correspondent Jeff Stein quoted Congressional staffers as saying that America’s Jewish allies had “crossed red lines” in their efforts to steal secrets from the United States. According to Stein, that was reportedly relayed to US lawmakers in classified briefings on Capitol Hill by officials from the Federal Bureau of Investigation, the Department of Homeland Security, the Department of State, as well as the National Counterintelligence Directorate. In a subsequent piece, Stein revealed that Israeli intelligence tried to spy on US Vice President Al Gore during an official state visit to Jerusalem 16 years ago. The effort was allegedly aborted after a US Secret Service agent caught an Israeli spy trying to enter the Vice President’s hotel room through a ceiling vent. But American officials have so far remained silent on the matter. When asked about it a press conference in Tel Aviv, Hagel said he had “heard of the report” but was “not aware of any facts that would substantiate the report”. He was standing beside Israel’s Minister of Defense, Moshe Yaalon, who also responded to the journalist’s question by reminding his audience that he served as Director of Israel’s Military Intelligence Directorate in the late 1990s. In that capacity, he said, he was “not allowed to spy in the United States whatsoever”. Read more of this post

US hesitant to share Boko Haram intel with Nigerian government

Boko Haram militantsBy JOSEPH FITSANAKIS | intelNews.org
United States military officials said on Tuesday that the Pentagon is not “at this point” sharing intelligence on the Boko Haram militant group with the Nigerian government. Last month, members of the armed group, which campaigns for an Islamist state in predominantly Muslim northern Nigeria, abducted at least 200 teenage girls from a boarding school in Chibok, a primarily Christian village located in the northeast of the country. Since then, the group’s leader, Abubakar Shekau, has threatened to kill or sell the girls as slaves unless the government of Nigeria releases Boko Haram prisoners. In the past week, the US has become directly involved in the search for the missing girls. On Monday, the US Department of Defense deployed fixed-wing aircraft on a variety of intelligence, surveillance and reconnaissance missions concentrating on Boko Haram strongholds in the northeast of the country, near Nigeria’s border with Cameroon. Meanwhile, 30 American advisers from the Federal Bureau of Investigation, Defense Intelligence Agency, and Department of State, are already in Nigerian capital Abuja, assisting in the search for the kidnap victims. American media has reported that the US Department of State is now sharing commercial satellite imagery with the Nigerian government in the context of the search. However, the Pentagon said that it is not “at this point […] sharing raw intelligence data” on Boko Haram with the Nigerian government. Speaking to reporters on Tuesday, Army Colonel Steve Warren, a spokesman for the US Department of Defense, refused to discuss the precise reasons why the Pentagon is withholding intelligence data from the Nigerian military. There is speculation, however, that the decision may be related to fears in Washington that the notoriously corrupt Nigerian military may have been infiltrated by Boko Haram members and sympathizers. Read more of this post