Switzerland claims embassy worker was abducted by Sri Lankan security officers

Swiss embassy Sri LankaSwitzerland has filed a formal complaint after an employee of the Swiss embassy in Sri Lanka was allegedly abducted by men who forced her to divulge sensitive information about the embassy and its activities. The Swiss Ministry of Foreign Affairs said on Tuesday that the embassy employee was kidnapped by four men while walking in the Sri Lankan capital Colombo, on November 25. The men took her to what appeared to be a safe house and interrogated her for several hours.

The men eventually forced the Swiss embassy employee, who is a Sri Lankan national, to unlock her personal cell phone. According to Swiss government officials, they appeared to be looking for information about a senior Sri Lankan police detective who recently fled to Switzerland with his family and was granted political asylum. Some Sri Lankan media identified the man as Nishantha Silva, a police detective who until recently headed the Sri Lankan Criminal Intelligence Division’s Organized Crime Investigation Unit.

Silva is one of hundreds of members of Sri Lanka’s public sector who have fled abroad following the election of President Gotabaya Rajapaksa last month. The Rajapaksa family is one of the most powerful in the country, and has a long history of influencing Sri Lankan politics. Hours after assuming power, the ultra-nationalist Rajapaksa pledged to “hunt down” the leadership of the police and security services who investigated his family after 2015, when the Rajapaksas were ousted from the government. Hundreds of police and security officers have since been arrested or summarily fired.

On Tuesday, a Swiss Foreign Ministry spokesman told The New York Times that the Swiss government had verified the details of the abduction of its embassy worker. The spokesman added that the employee was forced to disclose “embassy-related information” after she was “threatened at length” by the men. The latter released her after warning her that she would be killed if she spoke to anyone about her ordeal.

On Monday, a spokesman for President Rajapaksa told reporters in Colombo that the Sri Lankan government questioned the accuracy of the Swiss embassy worker’s account of her abduction. Later, however, the Sri Lankan government announced that it had launched an investigation into the allegations. It now appears that the Sri Lankan government is preventing the embassy worker from leaving the country while the investigation into her claims is underway.

Author: Joseph Fitsanakis | Date: 04 December 2019 | Permalink

FBI examining FaceApp over potential counterintelligence concerns

FBIThe United States Federal Bureau of Investigation says it is examining possible counterintelligence threats in connection with the popular online application FaceApp, which is headquartered in Russia. The application first made its appearance in January of 2017 and quickly became popular among smartphone users around the world. It allows users to upload a photograph of their face and then edit it with the help of artificial-intelligence software. The software can change the user’s photograph to make it look younger or older, or make it look as if it is from the opposite gender. The result can be impressively realistic and life-like.

The St. Petersburgh-based company behind FaceApp, Wireless Lab, claims that the photos of users are uploaded to cloud servers situated in New Zealand, Australia and Singapore. They are then deleted within two days from the moment they are uploaded by users, without ever being transferred to servers located in the territory of Russia. But the FBI does not seem to believe these assurances. In a letter sent late last month to the Minority Leader of the US Senate, Charles Schumer (D-NY), the Bureau said it was examining FaceApp as part of its counterintelligence mission.

In the letter, which was published on Monday, Jill Tyson, Assistant Director of the FBI’s Office of Congressional Affairs, said the fact that Wireless Lab is based in Russia raised a number of counterintelligence concerns. These relate to the types of data Wireless Lab collects on its customers and the privacy policies that apply to Russian Internet companies. According to Tyson, the Russian Federal Security Service (FSB) has the right to “remotely access all communications and servers on Russian networks without making a request” to network providers. He added that, if the FBI found that FaceApp was involved in activities meant to interfere with upcoming elections in the United States, the Bureau would investigate the matter further, and possibly involve the Foreign Influence Task Force, an FBI-led body that was established after the 2016 US presidential elections.

The FBI’s letter was written in response to an earlier letter sent to the Bureau by Senator Schumer in July, which expressed concerns about potential threats posed by FaceApp to the privacy of American Internet users and to the nations’ security as a whole.

Author: Joseph Fitsanakis | Date: 03 December 2019 | Permalink

Airbus fires employees for accessing classified German military documents

AirbusThe European multinational aerospace corporation Airbus has fired 16 of its employees for illegally possessing classified documents belonging to the German military. The Netherlands-registered aviation company, one of the world’s largest, has been cooperating with an investigation into the incident. The probe has been led by German authorities since September of 2018.

The incident, which German authorities have termed as industrial espionage, concerns two Airbus cybersecurity projects for weapons systems used by the German military. The projects are led by Airbus scientists at the company’s Communications, Intelligence and Security (CIS) program line, which is based in the German city of Munich. In September of last year, German media reported that a number of Airbus employees at the CIS facility had been found to possess classified files belonging to the German military, which they should not have been able to access.

An Airbus official said at the time that the classified documents related “to two future German [military] procurement projects”, and that the company had “self-reported […] potential wrongdoings by several employees […] to German authorities”. The official added that “[s]ome of our employees had documents that they shouldn’t have had”. It later emerged that the documents related to plans by the German Armed Forces to acquire a communication system from one of Airbus’ rival companies.

Following the September 2018 announcement, Airbus said that it had suspended 20 of its employees while it conducted an “ongoing internal review with the support of an external law firm”. At the same time it said that it was “fully cooperating with relevant authorities [in Germany] to resolve the matter”. It was also reported at the time that the German military had taken disciplinary action against one of its employees, but no further information was disclosed.

It has now emerged that Airbus has fired 16 of its CIS employees who were suspended last year. The news was first announced on Sunday by Deutsche Presse-Agentur (DPA), Germany’s largest news agency. Airbus subsequently confirmed the DPA’s report, but provided no further details about the case. It is not currently known whether the case has been closed.

Author: Joseph Fitsanakis | Date: 02 December 2019 | Permalink

Extradition fight over Russian man held in Greece may point to spies’ use of bitcoin

Aleksandr VinnikAn intense fight between the United States and Russia over the extradition of a Russian cryptocurrency tycoon being held in Greece, is raising questions about the possible use of cryptocurrencies by spies. The tycoon in question is Aleksandr Vinnik, 39, who in 2011 co-founded BTC-e, an international cryptocurrency-trading platform. BTC-e allowed users to buy or sell several popular cryptocurrencies, including bitcoin and litecoin, using Russian rubles, United States dollars, or European Union euro currencies. Although headquartered in Russia, BTC-e’s servers were located in Bulgaria, while its operations were conducted through its offshore components in Cyprus and the Seychelles.

By 2015, BTC-e was reportedly facilitating just over 3 percent of the worldwide daily volume of cryptocurrency trading. But, according to some sources, the company was also facilitating up to 70 percent of worldwide criminal activity involving cryptocurrencies. Washington alleges that the company was built on a model that relied heavily on the activities of criminal entities, as the latter sought the ability to conduct online monetary transactions without being tracked by governments.

In 2017, American authorities seized BTC-e’s website —a move that terminated the company’s operations. Washington also prompted authorities in Greece to arrest Vinnik, while he was vacationing at a Greek resort with his family. The Russian co-founder of BTC-e is today in a Greek prison, awaiting a decision by the Greek authorities to extradite him to the United States. If this happens, he will be tried on 21 counts of international money laundering and a host of other criminal charges.

Interestingly, however, shortly after Vinnik’s arrest, the Russian government filed a court order to have Greece extradite him to Russia, where he is reportedly wanted for relatively minor fraud-related charges. What is more, the Greek government was directly lobbied by no other than the Russian President Vladimir Putin —an unusually high-level approach, when one considers Vinnik’s trivial charges in Russia. France has also sought to have Vinnik extradited there, instead of the United States.

What lies behind these moves? There are many who believe that American authorities moved against BTC-e after realizing that Russian spies used the company to hide their traces while trying to meddle with the 2016 presidential elections in the United States. A recent report by the State Department’s RFE/RL news website claims that a number of London-based observers from groups such as Global Witness and Elliptic Enterprises believe there are strong links between Russian spy agencies and BTC-e. American authorities have managed to access information about the inner workings of BTC-e’s website. They are probably viewing Vinnik as an intelligence asset, who can potentially shed light on the company’s alleged role as a money laundering mechanism for Russian spies —and probably others as well.

Author: Joseph Fitsanakis | Date: 29 November 2019 | Permalink

As Australia launches probe, skeptics cast doubts on Chinese defector’s spy claims

Wang LiqiangAs the Australian government has launched an official investigation into the claims made by a self-styled Chinese intelligence defector, some skeptics have begun to cast doubts about his revelations. The claims of Wang “William” Liqiang have dominated news headlines in Australia for over a week. The 26-year-old from China’s eastern Fujian province reportedly defected to Australia in October, while visiting his wife and newborn son in Sydney. He is currently reported to be in a safe house belonging to the Australian Security Intelligence Organization (ASIO).

The Australian spy agency confirmed last week that Mr. Wang had provided a 17-page sworn statement, in which he detailed his work as an undercover intelligence officer for Chinese military intelligence. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they plan to carry out espionage operations on behalf of Bejing. Some media reports claimed that Mr. Wang had shared details about deep-cover Chinese intelligence networks in Australia. The Australian government said on Tuesday that an official investigation had been launched into Mr. Wang’s claims.

But some skeptics in Australia and elsewhere have begun to raise doubts about the Chinese defector’s claims, suggesting that he has given little —if any information— that is genuinely new. Some argue that Mr. Wang is much too young to have been entrusted with senior-level responsibilities in the intelligence agency of a country that rarely promotes twenty-somethings in high-ranking positions. Additionally, Mr. Wang appears to have no military background —he claims to have been recruited while studying fine art— which is not typical of a Chinese military intelligence operative.

Furthermore, Mr. Wang episode interviewers from Australian television’s 60 Minutes program that he began feeling tormented by moral dilemmas when his staff officers supplied him with a fake passport bearing a different name, in preparation for an operation in Taiwan. However, by his own admission, Mr. Wang had been supplied with fake passports for previous operations, so it is not clear why he lost his nerve at the time he did. In fact, case officers usually covet the opportunity to go undercover and feel a sense of exhilaration when they receive fake identification documents for an undercover mission.

Is Mr. Wang not sharing the entire background to his decision to defect to Australia? Or could he be deliberately amplifying his role in Chinese intelligence, in an effort to appear useful to the Australian government and thus secure political protection by Canberra? In the words of Alex Joske, an analyst at the  International Cyber Policy Centre of the Australian Strategic Policy Institute, the details in some of Mr. Wang’s claims mean that “government investigations should uncover the facts eventually. But we don’t know the full story and we probably never will”.

Author: Joseph Fitsanakis | Date: 26 September 2019 | Permalink

Europol culls thousands of Islamic State online accounts in ‘day of action’

Telegram AppThe law enforcement agency of the European Union, in cooperation with the popular online messaging service Telegram, has culled thousands of Islamic State online accounts in what it described as “a day of action”. The operation was coordinated by the European Union Agency for Law Enforcement Cooperation, better known as Europol. The agency coordinated its activities with the popular instant-messaging service Telegram, which the Islamic State has used as its main platform of mass communication since 2014.

In a press release that appeared on its website on Friday, Europol said that it had managed to locate “a significant portion of key actors within the Islamic State network on Telegram” and “push [them] away from the platform”. The messaging app confirmed the joint “day of action” with Europol and said it took down over 5,000 “terrorist accounts and bots” from its network on November 22 and 23. The company said this was nearly 10 times higher than the usual number of user accounts taken down daily for violating its user agreement.

The BBC said that the removal of the accounts appeared to affect heavily the activities of the Nashir News Agency, an Islamic State propaganda outlet that uses the Telegram app to publicize press releases from the Islamic State. Dozens of online channels and community groups that were moderated by Nashir News Agency editors were also impacted, as their moderators had disappeared from the network. On Saturday, some Telegram users began posting information about replacement accounts for Nashir News Agency press releases, but these too were taken down within hours.

This was the second major “day of action” against online terrorist propaganda that Europol coordinated, with the first one being in April of last year. But critics argue that such efforts are unlikely to have a long-term impact on the ability of terrorist groups to spread online propaganda, unless they are constant and systematic. Meanwhile, Islamic State sympathizers criticized the Telegram service on other social media platforms and warned that moves to silence the group would result in its membership going deeper underground.

Author: Joseph Fitsanakis | Date: 26 September 2019 | Permalink

Chinese defector reveals identities of Chinese undercover spies in Asia and Australia

Wang LiqiangA Chinese intelligence defector has reportedly given the Australian government information about entire networks of Chinese undercover spies in Hong Kong, Taiwan and Australia, according to reports. The story of Wang “William” Liqiang, made headlines all over Australia during the weekend, culminating in an entire episode of 60 Minutes Australia about him airing on Sunday. The 26-year-old from China’s eastern Fujian province reportedly defected to Australia in October, while visiting his wife and newborn son, who live in Sydney. He is currently reported to be in a safe house belonging to the Australian Security Intelligence Organization (ASIO).

Police in the Chinese city of Shanghai claim that Mr. Wang is a small-time criminal who has been found guilty of using fraudulent documents and has a 15-month suspended prison sentence on his record. In a statement issued on Sunday, China’s embassy in Canberra described Mr. Wang as a “convicted fraudster” who was “wanted by police after fleeing [China] on a fake passport”. But according to reports in the Australian media, Mr. Wang has provided the ASIO with a 17-page sworn statement, in which he details his work as an undercover intelligence officer. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they organize and implement espionage operations on behalf of Bejing.

In a leading article published on Saturday, The Sydney Morning Herald referred to Mr. Wang as “the first Chinese operative to ever blow his cover” and claimed that he had given the ASIO “a trove of unprecedented inside intelligence” about Chinese espionage operations in Southeast Asia. The newspaper said that the defector had revealed details about entire networks of Chinese intelligence operatives in Taiwan and Hong Kong. He also reportedly provided identifying information about deep-cover Chinese intelligence networks in Australia.

Meanwhile, in an unrelated development, Australian media said yesterday that the ASIO was examining allegations that a Chinese espionage ring tried to recruit an Australian businessman of Chinese background and convince him to run for parliament. According to reports, the spy ring approached Nick Zhao, a successful luxury car dealer, and offered to fund his political campaign with nearly $700,000 (AUS$1 million) if he run as a candidate for the Liberal Party of Australia. Zhao reportedly told the ASIO about the incident last year, shortly before he was found dead in a Melbourne hotel room. His death remains under investigation.

Author: Joseph Fitsanakis | Date: 25 November 2019 | Permalink

South Korea rejects US pressure to maintain intelligence agreement with Japan

South Korea JapanSouth Korea appears determined to reject calls from the United States to maintain an intelligence-sharing agreement with Japan, as relations between Seoul, Tokyo and Washington continue to experience tensions. The South Korean government has been issuing warnings since August that it will not renew the General Security of Military Information Agreement (GSOMIA), which is scheduled to lapse on Saturday. The agreement dates to 2016; it facilitates the sharing of intelligence between South Korea and Japan about North Korea’s missile and nuclear programs.

The agreement has fallen victim to an escalating tit-for-tat row between the two Asian countries, which is rooted in the use of forced Korean labor by Japan in World War II. South Korea is demanding financial compensation for the use of slave labor, including sex slaves, by Japanese occupation troops during Korea’s annexation by Japan from 1910 until 1945. In July, Tokyo responded to a mass boycott of Japanese goods by South Korean consumers by limiting the export of electronics to be used in South Korea’s ship-building industry. It also removed South Korea from the list of countries with the ability to fast-track their exports to Japan. South Korea responded last summer by threatening to effectively abandon GSOMIA.

Since that time, Washington has been pressuring Seoul to remain in the treaty. The United States is widely seen as the architect of GSOMIA, as it worked closely with Japan and South Korea for over 6 years to convince them to agree to exchange intelligence, despite their deep-rooted mutual animosity. The White House has traditionally viewed GSOMIA as a significant parameter in security cooperation between its allies in the Far East. Back in August, American officials warned that terminating GSOMIA would threaten its ability to monitor North Korean nuclear activity.

But Seoul is not willing to back down. On Thursday, the country’s Minister of Foreign Affairs, Kang Kyung-wha, said that unless there was “a change in Japan’s attitude, our position is we won’t reconsider”. Kang Gi-jung, Political Affairs Secretary to South Korean President Moon Jae-in, added that Seoul would “not wave a white flag”. Japan’s Minister of Defense, Taro Kono, urged South Korea to “make a sensible decision” and warned that Seoul, not Tokyo, would be the biggest victim of the termination of GSOMIA. Most observers expect that GSOMIA will simply expire come Saturday.

Author: Joseph Fitsanakis | Date: 22 November 2019 | Permalink

Turkey arrests German embassy lawyer on espionage charges

Germany Embassy TurkeyTurkish authorities have charged a lawyer working for the German embassy in Ankara with espionage, further-straining the already tense relationship between the two North Atlantic Treaty Organization allies. German newsmagazine Der Spiegel, which reported on the arrest, did not name the lawyer, but said he is a Turkish citizen and was arrested in September.

The newsmagazine said the lawyer had been hired by the German embassy to obtain information about Turkish citizens who had applied for political asylum in Germany. German authorities would regularly give the lawyer identifying information about asylum applicants. The lawyer would then verify with Turkish police that the applicants had a blank criminal record and were not wanted for participation in criminal activity. The German embassy would then forward the information collected by the lawyer to the German Federal Office for Migration and Refugees (known in Germany as BAMF), which would subsequently approve or reject the asylum applications.

Following the lawyer’s arrest by the Turkish National Intelligence Service (MİT), German authorities are concerned that the Turkish government has seized identifying information on at least 50 Turkish applicants for political asylum in Germany. Some of these applicants are reportedly members of Turkey’s persecuted Kurdish minority. Others are alleged supporters of Fethullah Gülen a United States-based former political ally of Turkish President Recep Tayyip Erdoğan, who Turkey accuses of having orchestrated the failed 2016 military coup against Erdoğan.

The German Foreign Office has described the lawyer’s arrest as “incomprehensible” and has reportedly warned those asylum seekers affected by it that their safety may be endangered. Meanwhile, German diplomats are engaged in high-level talks with the Turkish government to secure the lawyer’s release, according to Spiegel. The effort is being led by no other than Martin Erdmann, a veteran diplomat who is serving as Germany’s ambassador to Turkey.

Author: Joseph Fitsanakis | Date: 21 November 2019 | Permalink

Iraqi spy chief warns of impeding ‘catastrophe’ as ISIS rebuilds Middle East network

Saad Mozher Al-AllaqIn a rare interview, the head of Iraq’s military intelligence has warned of an impending “catastrophe” as the Islamic State continues to edge ever-closer to rebuilding its networks of fighters and supporters in the Middle East. Lieutenant General Saad Mozher Al-Allaq, head of Iraq’s Military Intelligence Directorate, gave a rare interview to the American news network CNN, which was aired on Monday.

In his interview, General Al-Allaq claimed that his agency was able to intercept recent communications from senior operatives of the Islamic State —also known as the Islamic State of Iraq and Syria, or ISIS. The communications allegedly refer to “Operation BREAK DOWN THE FENCES”, which he said is a plan by ISIS to storm numerous prisoner of war camps that are located across northwestern Iraq and Kurdish- or Turkish-controlled northern Syria. These camps hold as many as 10,000 men, many of whom are believed to be ISIS fighters. Other camps hold nearly 100,000 women and children who are connected to male ISIS fighters. According to General Al-Allaq, ISIS seeks to rebuild its powerbase in the region by freeing and re-arming these prisoners.

In addition to guarding against the possibility of a mass exodus of alleged ISIS prisoners and their families, the Iraqi spy chief said that his force has been working with Turkish authorities to neutralize networks of ISIS operatives in Turkey. Several senior ISIS “emirs” —senior members of the organization, with significant political influence and funding power— were able to bribe smugglers to take them to Turkey, where they are currently reorganizing the militant group’s illicit networks. The Iraqi government recently notified Ankara of the whereabouts of nine such ISIS “emirs”, said Al-Allaq.

The Iraqi spy chief concluded his interview by warning of an impending “catastrophe”, should ISIS be able to implement Operation BREAK DOWN THE FENCES and rebuild its support base in the region. Representatives of the Turkish government told CNN that Ankara was looking into the Iraqis’ allegations of ISIS “emirs” operating inside Turkey.

Author: Joseph Fitsanakis | Date: 19 November 2019 | Permalink

Russia, Lithuania and Norway exchange prisoners in rare three-way spy-swap

Frode BergA rare three-way spy-swap has reportedly taken place between Russia and two North Atlantic Treaty Organization (NATO) members, Lithuania and Norway. Rumors of a possible exchange of imprisoned spies between the three countries first emerged in mid-October. However, all three governments had either denied the rumors or refused to comment at the time. It now turns out that the spy-swap, which international news agencies described as “carefully coordinated” was the result of painstaking negotiations between the three countries, which lasted several months.

A major part of the process that led to last week’s spy swap was the decision of the Lithuanian parliament to approve altering the country’s criminal code. The new code allows the president of Lithuania to pardon foreign nationals who have been convicted of espionage, if doing so promotes Lithuania’s national interest. The new amendment also outlines the process by which the government can swap pardoned foreign spies with its own spies —or alleged spies— who may have been convicted of espionage abroad. On Friday, Lithuanian President Gitanas Nausėda announced he had pardoned two Russian nationals who had been convicted of espionage against Lithuania, in accordance with the new criminal code. The president’s move was approved by the country’s multi-agency State Defense Council during a secret meeting.

Shortly after President Nausėda’s announcement, Sergei Naryshkin, Director of Russia’s Foreign Intelligence Service (SVR) said that Moscow would immediately proceed with “reciprocal steps”. The Kremlin soon released from prison two Lithuanian nationals, Yevgeny Mataitis and Aristidas Tamosaitis. Tamosaitis was serving a 12-year prison sentence, allegedly for carrying out espionage for the Lithuanian Defense Ministry in 2015. Mataitis, a dual Lithuanian-Russian citizen, was serving 13 years in prison, allegedly for supplying Lithuanian intelligence with classified documents belonging to the Russian government.

The two Lithuanians were exchanged for two Russians, Nikolai Filipchenko and Sergei Moisejenko. Filipchenko is believed to be an officer in the Russian Federal Security Service (FSB), who was arrested by Lithuanian counterintelligence agents in 2015. He had been given a 10-year prison sentence for trying to recruit double agents inside Lithuania, allegedly in order to install listening bugs inside the office of the then-Lithuanian President Dalia Grybauskaite. Moisejenko was serving a 10½ year sentence for conducting espionage and for illegally possessing firearms. Lithuania alleges that Moisejenko had been tasked by Moscow with spying on the armed forces of Lithuania and NATO. Along with the two Lithuanians, Russia freed Frode Berg (pictured), a Norwegian citizen who was serving a prison sentence in Russia, allegedly for acting as a courier for the Norwegian Intelligence Service.

On Saturday, Darius Jauniškis, Director of Lithuania’s State Security Department, told reporters in Vilnius that the spy swap had taken place in a remote part of the Russian-Lithuanian border. He gave no further information about the details exchange, or about who was present at the site during the spy-swap.

Author: Joseph Fitsanakis | Date: 18 November 2019 | Research credit: E.G. | Permalink

Al-Baghdadi’s ISIS hideout was equipped with frequently used internet connection

Abu Bakr al-BaghdadiThe Islamic State’s Syrian hideout that housed the group’s leader until his demise on October 26, was equipped with a frequently used internet connection, according to Arab media reports. Abu Bakr al-Baghdaid, the self-proclaimed caliph of the Islamic State, was killed by United States soldiers in Barisha,  a village in the Syrian province of Idlib, which is located just two miles from the Turkish border.

The region that surrounds Barisha is under the control of Turkey and can most accurately be described as a Turkish protectorate inside Syria. Moreover, it is heavily monitored by several intelligence agencies that have been looking for al-Baghdadi for years. It has therefore been generally assumed that the Islamic State leader’s hideout was kept isolated from the outside world and that no digital telecommunications means were used by its inhabitants, out of fear that they would be monitored by the Syrian authorities, Turkey, the United States, or others.

But a new report from the Dubai-based Al-Aan TV claims that the hideout was equipped with a frequently used internet connection and that it was active almost up to the moment US troops stormed the compound. The exclusive report, which aired on Thursday, alleges that the internet connection was set up in February of this year, and that it was used almost daily. The last time it was active was just 12 hours prior to the raid that killed al-Baghdadi and several members of his family.

The bill for the internet connection was approximately $8.00 a month and was paid by Abu Muhammad al-Halabi, a Syrian smuggler whose name also appears on tax records as the owner of the property, according to Al-Aan. The report provides no information about the type of online activity that the internet connection at the Barisha compound was used for.

Author: Joseph Fitsanakis | Date: 15 November 2019 | Permalink

Venezuelan ex-spy chief disappears as Spain seeks to extradite him to US

Hugo CarvajalThe former director of Venezuela’s military spy agency, who is wanted in the United States for drug trafficking, reportedly disappeared in Spain as authorities there were attempting to extradite him to Washington. Hugo Carvajal is a retired general and former diplomat, who was a member of the late Venezuelan President Hugo Chávez’s inner circle. From 2004 to 2011, under Chávez’s tutelage, Carvajal headed the Directorate General of Military Counterintelligence (DGCIM).

In 2008 the US named Carvajal as a major facilitator of international drugs trafficking and imposed financial sanctions on his assets around the world. Washington accused Carvajal of assisting the paramilitary group known as the Revolutionary Armed Forces of Colombia (FARC) transport drugs from Latin America to Mexico and from there to the US.

Things took an interesting turn, however, when in February of this year Carvajal posted a video on social media in which he denounced Chávez’s successor, President Nicolás Maduro, and sided with his arch-nemesis, Juan Guaido, the President of the National Assembly of Venezuela. In his video, Carvajal urged the Venezuelan armed forces to stop siding with Maduro and support Guaido as Venezuela’s acting president. Guaido is openly supported by the United States and dozens of other Western countries.

Soon after making his announcement, Carvajal fled to Spain, where he was arrested in April, after the US Department of Justice filed a formal request for the former spy chief’s extradition to America. But in September, Spain’s top criminal court ruled that Carvajal would not be extradited to the US. The former spy chief was released minutes after the court made its decision known.

Last Friday, however, the same court accepted an appeal by the Office of the Public Prosecutor and overturned its earlier decision. Shortly after the court’s decision, Spanish media reported that Carvajal had already been arrested and was due to be transported to the US in a matter of days. But three days later, the former spy chief posted a message on his personal Twitter account saying that neither he nor his lawyers had been approached by Spanish police. It appeared, then, that Carvajal had not been detained.

Spanish newspaper El Pais reported on Tuesday that Carvajal was nowhere to be found when Spanish police officers went to his residence in Madrid to arrest him. His whereabouts are currently unknown, said the paper. The US Department of Justice has not commented on the case.

Author: Joseph Fitsanakis | Date: 13 November 2019 | Permalink

Massive data dump identifies users of influential far-right website

Atomwaffen DivisionA data dump of unprecedented scale includes usernames, IP addresses and even the content of thousands of private chat logs stolen from an influential neo-Nazi website that is now defunct. The data belonged to IronMarch, which was founded in 2011 by Alexander Mukhitdinov, a Russian far-right activist using the online nom-de-guerre “Slavros”. In the nearly six years of its existence, the website featured some of the most extreme and uncompromising far-right content on the World Wide Web.

The discussions that took place on IronMarch’s message boards are believed to have led to the creation of several far-right groups in Europe, Australia, and the United States. Among them is the notorious Atomwaffen Division (pictured), an American neo-Nazi group that focuses on street-fighting and is known to train its members in the use of military-grade weapons and guerilla warfare tactics. Another group that organized and recruited heavily through IronMarch was Vanguard America, one of the organizers of the Unite the Right rally in Charlottesville, Virginia in 2017.

But the website abruptly shut down its operations in late 2017. No explanation was given. Users of far-right online forums are used to experiencing such sudden changes in hosting platforms, which are due to legal challenges, intervention by law enforcement, etc. So they did what they always do in such cases: they migrated to other far-right platforms where they continued to discuss and organize. IronMach never resurfaced, so it was eventually forgotten.

Last Wednesday, however, a user calling themselves “antifa-data” uploaded what appears to be the entire metadata and chat log archive of IronMarch on the website of the Internet Archive. The content was later removed, but not before it was downloaded by thousands of Internet Archive users, among them government agencies. The data dump reportedly includes the usernames of IronMarch members, as well as the emails associated with their individual accounts. It also contains the IP addresses of IronMarch members and even the contents of private messages that they exchanged with other members.

Some investigative websites have since reported that numerous IronMarch users were associated with email accounts belonging to American universities. Others stated in private messages that they were members of the armed forces of several countries in Europe and the Americas. At least one user appears to have run for Congress in the United States. On Friday, the American website Military Times said that United States authorities were concerned that many of IronMarch’s members said they were serving in the US Armed Forces or expressed a desire to join a military branch. A spokesman for the US Marine Corps told the Military Times that there was “no place for racial hatred or extremism in the Marine Corps”.

Author: Joseph Fitsanakis | Date: 12 November 2019 | Permalink

Turks feared Russia might bomb Erdoğan’s palace in 2015, intelligence memo shows

Hmeimim AirbaseAuthorities in Turkey were concerned that Russia might bomb the presidential palace in Ankara in 2015, to retaliate against the downing of a Russian fighter jet by the Turkish military, according to an intelligence report. On November 25 of that year, a Russian Sukhoi Su-24M attack bomber was shot down by a Turkish F-16 fighter jet over the Syrian-Turkish border. Ankara claimed that the Russian aircraft had violated Turkish airspace for longer than five minutes and had failed to respond to 10 warning messages communicated by radio. By the time the Russian plane was fired upon it was nearly 1.5 miles inside Turkish airspace, according to Turkey’s Ministry of Defense. But the Kremlin claimed that the downed aircraft had been flying a mile south of the Turkish border when it was shot down.

A few hours after the incident, Russian President Vladimir Putin described it as “a stab in the back by terrorist accomplices” and warned Ankara that Moscow would not tolerate such attacks on its armed forces. International observers expressed concern about a possible armed retaliation by Russia against the Turkish military. Now a formerly classified intelligence report suggests that Turkish authorities were concerned that Russia might bomb the country’s presidential palace in Ankara. The report was unearthed by the Nordic Research Monitoring Network (NRMN), a security-oriented research initiative staffed by Turkish experts who live in Europe and the United States.

The NRMN said the previously classified report was authored by Signals Intelligence Directorate of Turkey’s National Intelligence Organization, known as MİT. It describes an intercepted conversation that took place on December 3, 2015. The conversation involved a Syrian military officer, who was believed to be a brigadier general in the army of Syrian President Bashar al-Assad. The officer, identified in the document only as Adnan, was reportedly speaking with an unnamed Russian general, identified only as Sergei, and another unidentified senior officer in the Syrian armed forces. The discussion concerned an upcoming meeting between Syrian and Russian military officials at the Hmeimim Airbase, a Russian-operated military installation on the outskirts of Latakia.

The purpose of the meeting was for the Russian forces to officially notify the Syrians that their warplanes would be carrying a heavier payload in the future, and to explain why. At one point in the conversation the Russian general told the Syrians that part of the heavier payload would consist of “barrel bombs [that] will go to Erdoğan’s palace”. The MİT interpreted that to mean the Turkish Presidential Complex, which is located inside the Atatürk Forest Farm in the Beştepe neighborhood of Ankara. The ensuing intelligence report contains handwritten notes indicating that the information contained in it was communicated to the leadership of the Turkish Armed Forces and the Turkish General Staff.

At the end no attack took place. In June of the following year President Erdoğan sent a letter to his Russian counterpart, in which he expressed his condolences for the family of the Russian pilots who were killed when their aircraft was shot down. Following the July 2016 coup, the two Turkish pilots who had shot down the Russian aircraft were arrested on suspicion of being involved in the attempt to topple Erdoğan. This, in association with the Turkish president’s letter of sympathy, were seen by Moscow as goodwill gestures from Ankara. Relations between the two countries were eventually restored.

Author: Joseph Fitsanakis | Date: 11 November 2019 | Permalink