Russian spies ‘launched major cyber attack on Ukraine’ prior to naval incident

Strait of KerchRussia “paved the way” for last November’s seizure of Ukrainian Navy ships by launching a major cyber attack and disinformation campaign aimed at Ukraine, according to a cyber security firm and the European Union. In what has become known as the Kerch Strait incident of November 25, border service coast guard vessels belonging to the Russian Federal Security Service (FSB) opened fire on three Ukrainian Navy ships that were attempting to enter the Sea of Azov through the Kerch Strait. All three Ukrainian vessels, along with crews totaling 24 sailors, were captured by the Russian force and remain in detention. Ukraine condemned Russia’s action as an act of war and declared martial law in its eastern and southern provinces. But Moscow said the incident had been caused by a provocation by the Ukrainian government, in a desperate effort to increase its popularity at home. Meanwhile, the three Ukrainian ships and their crews remain in Russia.

But now a private cyber security firm has said that Moscow launched a series of cyber attacks on Ukrainian government servers, which were aimed at gathering intelligence that could be used for the ships’ capture. In a separate development, the European Union’s security commissioner has alleged that the Kremlin launched an elaborate “disinformation campaign” aiming to “soften up public opinion” before seizing the Ukrainian ships.

The American-based cyber security firm Stealthcare said this week that the cyber attacks were carried out by Carbanak and the Gamaredon Group, two hacker entities that are believed to be sponsored by the Russian intelligence services. The first wave of attacks, which occurred in October of this year, centered on a phishing campaign that targeted government agencies in Ukraine and other Eastern European countries. Victims of these attacks had “important functions” of their computers taken over by remote actors who stole and exfiltrated data, according to Stealthcare. Another attack installed back doors on computer servers belonging to Ukrainian government agencies in November, just days prior to the Kerch Strait crisis. The two attacks, said the company, provided the hackers with “information that would have been very […] relevant in planning” the November 25 naval crisis, said Stealthcare. The company added that there was “no doubt that this was a Kremlin-led reconnaissance effort to prepare for the Kerch Strait crisis”.

Meanwhile on Monday Julian King, a British diplomat who is currently the European Commissioner for the Security Union, said that Russia “paved the way for the Kerch Strait crisis” through a systematic fake news campaign that “lasted for more than a year”. The campaign, said King, included the use of social media to spread false rumors, such as claims that the Ukrainian government had infected the Black Sea with bacteria that cause cholera. Another report by Russian media allegedly claimed that Kiev had tried to secretly transport a nuclear device to Russian-annexed Crimea through the Kerch Strait. The EU security commissioner added that social media platforms and online search engines like Google had a responsibility “to identify and close down fake accounts that were spreading disinformation”.

Author: Joseph Fitsanakis | Date: 12 December 2018 | Research credit: D.V. | Permalink

CIA names first woman to lead Directorate of Operations

CIAIn a surprising departure from established practice, the United States Central Intelligence Agency has publicized the name of its incoming head of operations. Beth Kimber, a 34-year veteran of the Agency, will become the first woman in the CIA’s 70-year history to lead the Directorate of Operations. Officers in the Directorate of Operations, formerly known as the National Clandestine Service, spend their careers recruiting foreign agents to spy for the United States, while also carrying out covert operations around the world. This is also the first time that the CIA has chosen to publicly identify its Deputy Director for Operations —Kimber’s official title, abbreviated as DDO. Previous DDO have been undercover officers whose namse have remained undisclosed. Kimber’s promotion was announced on December 7 by Brittany Bramell, the CIA’s Director of Public Affairs.

Little is known about Kimber, who spent much of her career as a case officer before joining the CIA’s senior intelligence staff. She is a graduate of Hamilton College, a private, liberal arts college situated in upstate New York, and spent much of her early career with the CIA as a case officer in Western Europe. She is also believed to have led the “Russia Group”, a network of intelligence planners in the CIA’s Directorate of Operations that manage a broad spectrum of espionage operations targeting the Russian spy services. She has also served as deputy director of the National Clandestine Service, before it was renamed to Directorate of Operations. Newsweek intelligence correspondent Jeff Stein wrote about Kimber in 2014, but did not name her, as she was still serving in an undercover capacity.

For a few months this year, Kimber served as the CIA’s acting deputy director while Congress considered President Donald Trump’s nomination of Gina Haspel’s for the Agency’s director position. Kimber’s most recent prior post in the CIA was head of the Agency’s Europe and Eurasia Mission Center. Kimber is the third woman to assume a central role in the CIA in the past six months. In May of this year, Gina Haspel, a 33-year veteran of the CIA, became the Agency’s first female director. In August, Haspel picked Sonya Holt, a 34-year CIA veteran, to serve as the Agency’s chief diversity and inclusion officer. On Friday, the American news network CBS cited “people familiar with the shift”, who said that the outgoing DDO “will take another role within the agency” and is expected to remain undercover.

Author: Joseph Fitsanakis | Date: 11 December 2018 | Permalink

Jailed Russian who spied for CIA writes letter to Trump, asking to be freed

Russian Ministry of Internal AffairsA Russian former police officer, who is serving a prison sentence in Russia for having spied for the United States Central Intelligence Agency, has written an open letter to President Donald Trump, asking to be freed. Yevgeny A. Chistov was arrested by the Russian Federal Security Service (FSB) in 2014 on charges of spying for Washington. During his trial, he admitted having been recruited by the CIA when he worked as an officer in the police, Russia’s federal law-enforcement agency, which operates under the Ministry of Internal Affairs. Russian state prosecutors accused him of having established contact with the CIA in 2011. In 2015, he was sentenced to 13 years in prison, which he is currently serving at a labor camp in the Nizhny Novgorod town of Bor, located in central European Russia.

On Saturday, British newspaper The Guardian published a letter that was allegedly written by Chistov. In the letter, the jailed spy admits that he passed Russian state secrets to the CIA for three years, after deciding “to help the US as a friend”. He claims that he did it out of love for his country, and in order to help “overthrow […] the regime” of Russian President Vladimir Putin. Chistov goes on to accuse “Putin and his cronies” of having plundered Russia and of oppressing its people through “corruption and extortion”. He blames the Kremlin for Russia’s current economic state: “we have a resource-rich country yet our people are poor”, he says. The jailed spy adds that he told the CIA about the “secret plans” of the Ministry of Internal Affairs, that he provided “names of some people from the FSB”, and that he “revealed some objectives of Russia’s Ministry of Defense”. He does not provide details. He then claims that, even though he was paid by the CIA for his services, he did not act out of self-interest.

Chistov says that the conditions of his imprisonment are inhumane and that he and his family “are in great danger in Russia”. He also claims that his wife visited the US embassy in Ukraine in an attempt to secure a travel visa, but that her application was rejected and she was forced to return to Russia. The jailed spy adds that he “wrote two letters to the CIA asking them to help and received no response”. He then pleads with President Trump to help him, in two ways. First, by granting asylum in the US to his wife and mother. Second, by swapping him with someone “who worked for Russia” and is serving time in a US prison. “I want to appeal to the president to conduct the exchange”, he concludes.

The United States has participated in very few spy swaps in the post-Cold War era. In 2010, Washington and Moscow conducted one of history’s largest spy exchanges, as ten deep-cover Russian agents captured in the US earlier that year were swapped for four Russian citizens imprisoned by Moscow for spying for the US and Britain. Four years later, a Cuban intelligence officer who spied for the CIA was released as part of a wider exchange between Washington and Havana of persons held in each other’s prisons on espionage charges. The White House has not commented on Chistov’s letter.

Author: Joseph Fitsanakis | Date: 10 December 2018 | Permalink

ISIS evolving into ‘effective clandestine organization’ US Pentagon warns

ISIS forces in RamadiA report from the United States Department of Defense warns that the Islamic State is swiftly returning to its insurgent roots, as observers in Iraq and Syria caution that the group is witnessing a revival. It has been four years since the Islamic State —known then as the Islamic State of Iraq and Syria, or ISIS— conquered much of eastern Syria and more than a third of Iraq’s territory. But by the end of 2017, virtually the entirety of ISIS’ self-styled ‘caliphate’ had been obliterated by an ‘unholy alliance’ of US-backed Iraqi government forces, Iranian-supported Shiite militias, Kurdish guerillas and Western airpower.

However, experts warn that, despite its loss of territorial control, the Islamic State maintains an active force of as many as 30,000 armed fighters in Iraq and Syria. Additionally, a recent US government report argues that, having been driven out of nearly all of the territory that it once held, the Islamic State is promptly “returning to its insurgent roots”. The report, authored by analysts at the US Department of Defense, claims that the militant Sunni group is “re-emerging as a guerrilla force”. In the place of what used to be a de-facto state, an “effective clandestine ISIS organization appears to be taking hold”, it states. The Pentagon document, summarized in a Financial Times article on Thursday, appears to be backed by information from the ground in Iraq and Syria. Iraqi military sources told The Times that ISIS appears to have more fighters in its ranks than initially thought, and that the group’s organizational structure that helped it grow in the first place “has not been eliminated”.

Moreover, the group is “still well-funded” and its operations remain lethal, said the paper, especially in Iraq, where it continues to undermine the government’s efforts to improve the country’s security. Islamic State fighters are systematically targeting regional leaders, said The Times, in an effort to prevent the government from delivering economic development in Iraq’s Sunni-majority western regions. A similar pattern of activities is being observed in Syria, where a resurgence of ISIS activity has prolonged the deployment of around 2,000 US military personnel there. What is more, ISIS fighters frequently cross the Iraq-Syria border and spend much of their time in safe houses and other hideouts. The paper quotes Yahya Rasool, spokesperson for the Iraqi Army’s Joint Operations Command, who says that “our war on ISIS today is an intelligence war, not a military war. We are searching and raiding their hide-outs”.

Author: Joseph Fitsanakis | Date: 07 December 2018 | Permalink

Canada arrests daughter of Chinese telecom giant’s founder at US request

Meng WanzhouThe daughter of the founder of Huawei Technologies, one of the world’s leading telecommunications hardware manufacturers, has been arrested in Canada, reportedly at the request of the United States. Meng Wanzhou (pictured, also known as Sabrina Meng) serves as Huawei’s deputy chair and chief financial officer. She is the daughter of Ren Zhengfei a former officer in the Chinese People’s Liberation Army, who established the company in 1988 and has since amassed a personal fortune estimated at $3.5 billion. By virtue of her family background and position in Huawei, Meng is often referred to as “a member of China’s corporate royalty”.

Few details of Meng’s arrest have been publicized. On Wednesday, Canada’s Department of Justice confirmed that the Huawei CFO was detained on December 1 in Vancouver as she was transferring between flights. The Justice Department also confirmed that the arrest occurred at the request of American law enforcement officials. In a carefully worded statement, the Canadian government said Meng is “sought for extradition by the United States” and that her bail hearing will be taking place this coming Friday. On Wednesday, the Canadian newspaper The Globe and Mail cited an unnamed “Canadian law enforcement source with knowledge of the arrest”, who said that US authorities had evidence that Meng “tried to evade the American embargo against Iran”. This statement appears to refer to reports in Western media in April of this year, according to which the US Departments of Commerce and Treasury were probing suspected violations of Washington’s sanctions against Iran and North Korea by Huawei.

The embassy of China in Canada immediately protested news of Meng’s arrest, saying that the Huawei CFO had been detained despite “not violating any American or Canadian law”. In a statement issued on Wednesday, the embassy added that it had “lodged stern representations” to the Canadian government and “urged them to immediately […] restore the personal freedom of Ms. Meng Wanzhou”. Meanwhile, a representative at Huawei’s corporate headquarters in the southern Chinese city of Shenzhen told the BBC that the company is certain “the Canadian and US legal systems will ultimately reach a just conclusion” in the case.

Several officials in the United States, United Kingdom, Australia and other Western countries, have repeatedly flagged Huawei as a company that is uncomfortably close to the Chinese government and its intelligence agencies. In 2011, the US Open Source Center, which acts as the open-source intelligence arm of the Office of the Director of National Intelligence, became the first US government agency to openly link Huawei with the Chinese intelligence establishment. In 2013, the British government launched an official review of Huawei’s involvement in the UK Cyber Security Evaluations Centre in Oxfordshire, England, following a British Parliament report that raised strong concerns about the Chinese company’s links with the government in Beijing. And in 2017 the Australian government expressed concern about Huawei’s plan to provide high-speed Internet to the Solomon Islands, a small Pacific island nation with which Australia shares Internet resources.

Author: Joseph Fitsanakis | Date: 06 December 2018 | Permalink

Czechs accuse Moscow of ‘most serious wave of cyberespionage’ in years

Czech Security Information ServiceThe main domestic intelligence agency of the Czech Republic has accused Russia of “the most serious wave of cyberespionage” to target the country in recent years. The claim was made on Monday in Prague by the Security Information Service (BIS), the primary domestic national intelligence agency of the Czech Republic. Details of the alleged cyberespionage plot are included in the BIS’ annual report, a declassified version of which was released this week.

According to the document, the cyberespionage attacks were carried out by a hacker group known as APT28 or Fancy Bear, which is believed to operate under the command of Russian intelligence. The hacker group allegedly targeted the Czech Ministry of Defense, the Ministry of Foreign Affairs and the headquarters of the country’s Armed Forces. As a result, the electronic communication system of the Ministry of Foreign Affairs was compromised “at least since early 2016”, said the report (.pdf). More than 150 electronic mailboxes of ministry employees —including diplomats— were accessed, and a significant number of emails and attachments were copied by the hackers. The compromise was terminated a year later, when BIS security personnel detected the penetration. The BIS report goes on to say that a separate cyberespionage attack was carried out by a Russian-sponsored hacker group in December of 2016. An investigation into the attacks concluded that the hackers were not able to steal classified information, says the report. It adds, however, that they were able to access personal information about Czech government employees, which “may be used to launch subsequent attacks [or to] facilitate further illegitimate activities” by the hackers.

The BIS report concludes that the hacker campaign was part of “the most serious wave of cyberespionage” to target the Czech Republic in recent years. Its perpetrators appear to have targeted individuals in “virtually all the important institutions of the state” and will probably continue to do so in future attacks, it says. Moreover, other European countries probably faced similar cyberespionage breaches during the same period, though some of them may not be aware of it, according to the BIS. Czech Prime Minister Andrej Babis told parliament on Tuesday that his cabinet will discuss the BIS report findings and recommendations early in the new year.

Author: Joseph Fitsanakis | Date: 05 December 2018 | Permalink

MI6 spy chief outlines ‘fourth generation espionage’ in rare public speech

Alex YoungerThe director of Britain’s Secret Intelligence Service —known as MI6— has outlined the parameters of a new, “fourth generation of espionage”, which he said is needed to combat the “threats of the hybrid age”. Alex Younger, 55, is a career intelligence officer who joined MI6 in 1991, after serving in the British Army. He served as chief of global operations —considered the number two position at MI6— before being appointed director of the spy agency in October 2014. He previously served in the Middle East, Europe, and Afghanistan, where he represented MI6 as its most senior officer in the country following the US-led military invasion of 2001. Until this week, Younger had given a single public address since becoming director of MI6. But on Monday he spoke again, this time at the University of St. Andrews in Scotland, from where he graduated with a degree in economics.

After cautioning his audience that MI6’s methods, operations and people —some of whom “have paid the ultimate price”— must remain secret, Younger said that technological progress has “profoundly changed [MI6’s] operating environment”. Technological change, as well as the degree of interconnectedness, he said, has made the world “dramatically more complicated”. He went on to add that the resulting ambiguity is referred to by MI6 as a constant stream of “hybrid threats”, namely challenges posed by nation-states operating “in the gray spaces of the hybrid era”. They do so in order to probe the West’s “institutions and defenses in ways that fall short of traditional warfare”, said Younger. The British spy chief added that MI6, as “one of the few truly global intelligence agencies” is well positioned to respond to hybrid threats, mostly by augmenting its human intelligence role —using human spies to collect information.

Human intelligence, which is MI6’s core task, “will never change fundamentally”, said Younger, adding that “in fact it will become even more important in a more complex world”. However, it will need to evolve to meet the challenges of the hybrid age. Younger said that MI6 was pioneering a “fourth generation of espionage”, which is the product of the fusion of traditional human skills with “accelerated [technological] innovation”. This new generation of espionage said Younger, relies not on individual work but on operations that are carried out by dynamic teams within and across state agencies. Additionally, the ultimate task of these operations is not simply to know the actions of one’s adversaries, but “to change their behavior”, said the British spy chief. Furthermore, in order to successfully develop fourth generation espionage capabilities, MI6 will have to “ensure that technology is on our side, not that of our opponents”, noted Younger. The spy chief gave an example by referring to the case of the near-fatal poisoning of Sergei Skripal, the Russian former double spy who was allegedly attacked by two Russian military intelligence officers in Salisbury, England, last March. It was “bulk data combined with modern analytics” that exposed the culprits of the operation, he said. But the same methods, which make the modern world more transparent, can posed “a serious challenge if used against us”, warned the MI6 chief.

Author: Joseph Fitsanakis | Date: 04 December 2018 | Permalink

CIA report says Saudi crown prince sent text messages to Khashoggi killer

Saud al-QahtaniSaudi Crown Prince Mohammed bin Salman sent at least eleven text messages to the man in charge of the 15-member hit team that killed journalist Jamal Khashoggi last month, according to a classified report produced by the United States Central Intelligence Agency. The CIA report was leaked to The Wall Street Journal, which said in a leading article on Saturday that the Saudi royal had sent the messages in the hours before and after Khashoggi’s brutal murder at the Saudi consulate in Istanbul, Turkey, on October 2, 2018. Khashoggi, 59, was a Saudi government adviser who moved to the US and became a vocal critic of the kingdom’s style of governance. He was killed and later dismembered by a hit team inside the Saudi consulate in Istanbul, where he had gone for a scheduled visit in order to be issued written proof of his divorce from his former wife in Saudi Arabia.

Late last month, the CIA and its British equivalent, the Secret Intelligence Service (MI6), were reported to have concluded that Khashoggi’s murder was directly ordered by Prince Salman. But US President Donald Trump and leading members of his cabinet, including Secretaries of State Mike Pompeo and Defense James Mattis, have disputed these claims, saying there is “no smoking gun” that proves Prince Salman’s involvement. The US president said that Saudi Arabia was “a great ally” of Washington and that Prince Salman’s role in Khashoggi’s murder was unclear. “Maybe he did and maybe he didn’t”, he told reporters in Washington on November 20, referring to the prince, whom he considers a personal friend. Instead, the White House has placed blame for the journalist’s murder on Saud al-Qahtani (pictured), a former advisor to Saudi Arabia’s late King Abdullah, who is believed to have coordinated Khashoggi’s killing.

But new a new CIA assessment of Khashoggi’s murder that was leaked to The Wall Street Journal claims that the US spy agency has concluded with “medium-to-high” confidence that Prince Salman “personally targeted” the journalist and “probably ordered his death”. The leaked report, said The Journal, rests on several findings, including the fact that the prince sent at least 11 messages to al-Qahtani in the hours right before and right after the latter’s hit-team killed Khashoggi in Istanbul. The CIA report states that the Agency does not have access to the contents of the texts. But it states that this pattern of communication, along with other pieces of evidence “seems to foreshadow the Saudi operation launched against Khashoggi”.

Author: Joseph Fitsanakis | Date: 03 December 2018 | Permalink

US government plans background checks on Chinese students over espionage fears

Chinese students in USAThe United States government plan to impose tighter visa restrictions and wider background checks on Chinese nationals studying at American universities, over espionage concerns. The news follows reports earlier this year that the administration of US President Donald Trump considered banning all Chinese nationals from studying at American universities. In October of this year, The Financial Times reported that the White House came close to imposing the ban, after it was allegedly proposed by Stephen Miller, speechwriter and senior advisor to Trump. Miller became known as the main architect of Executive Order 13769 —the travel ban imposed on citizens of several countries, most of them predominantly Muslim. According to The Financial Times, Trump was eventually dissuaded from imposing the Chinese student ban by Terry Branstad, US ambassador to China.

Now, however, the Trump administration is reportedly considering the possibility of imposing deeper background checks and additional vetting on all Chinese nationals wishing to study in the US. Citing “a US official and three congressional and university sources”, Reuters said on Thursday that the measures would apply to all Chinese students wishing to register in undergraduate and graduate academic programs in the US. The news agency quoted a “senior US official” as saying that “no Chinese student who’s coming [to the US] is untethered from the state […. They all have] to go through a party and government approval process”. Reuters reported that the proposed plan includes a comprehensive examination of the applicants’ phone records and their presence on social media platforms. The goal would be to verify that the applicants are not connected with Chinese government agencies. As part of the proposed plan, US law enforcement and intelligence agencies would provide counterintelligence training to university officials.

However, the plan has many American universities —including elite Ivy League schools— worried that they may be losing up to $14 billion in tuition and other fees spent annually by more than 350,000 Chinese nationals studying in the US. The fear is that the latter may be looking to study elsewhere, in countries such as Canada, Australia and the United Kingdom. Reuters said that many of America’s top universities are “regularly sharing strategies to thwart” plans by the Trump administration to make it more difficult for Chinese nationals to study in the US. The news agency said it contacted the Chinese ambassador to Washington, who called the White House’s fears of espionage by Chinese students “groundless” and “very indecent”.

Author: Joseph Fitsanakis | Date: 30 November 2018 | Permalink

New law to give Australian intelligence officers more rights to use firearms

Australian Secret Intelligence ServiceThe Australian government has proposed a new law that would give intelligence officers broader powers to use firearms during undercover operations abroad. If it is approved by parliament, the new law would apply to the Australian Secret Intelligence Service (ASIS), a civilian intelligence agency that carries out covert and clandestine operations abroad. Modeled after Britain’s Secret Intelligence Service (MI6), ASIS was established in 1952, but its existence was not officially acknowledged by the Australian government until 25 years later, in 1977.

In 2004, ASIS was given legal permission for the first time to use firearms during undercover operations abroad. However, under current Australian law, this is allowed only as a last resort. ASIS personnel engaged in overseas operations are allowed to employ firearms in self-defense or to protect their agents —foreigners that have been recruited by ASIS to spy for Australia. However, the current government of Prime Minister Scott Morrison argues that ASIS personnel must be given broader powers to exercise “reasonable force” via the use of firearms during overseas operations. In a speech on Wednesday, Australia’s Minister for Foreign Affairs Marise Payne said that the overseas environment in which ASIS operates today is more complex than that of 2004, when the current laws of engagement were enacted. She added that nowadays ASIS personnel work in more hazardous locations, including warzones, and carry out “more dangerous missions in new places and circumstances”.

The government argues that the proposed changes will allow ASIS personnel to “protect a broader range of people and use reasonable force if someone poses a risk to an operation”. The new law will give ASIS officers permission to open fire against adversaries in order to protect parties other than themselves —such as hostages— or to avoid getting captured. This, says the government, will allow them to efficiently “protect Australia and its interests”. The last time that the Australian government flirted with the idea of giving ASIS broader powers to use firearms during undercover operations was in 2010. That year, the government of Prime Minister Kevin Rudd commissioned a multimillion dollar independent review of the Australian intelligence community’s mission and operations. The review proposed that ASIS personnel be allowed more powers to carry and handle weapons while engaging in “paramilitary activities” outside Australia. But the proposal was never enacted into law.

The latest proposal by the Morrison administration is scheduled to be discussed in the Australian Parliament today.

Author: Joseph Fitsanakis | Date: 29 November 2018 | Permalink

Head of CIA’s Korean mission center to resign, say sources

Andrew KimA senior North Korea expert in the United States Central Intelligence Agency, who has been instrumental in the ongoing negotiations between Washington and Pyongyang, has tendered his resignation, according to sources. The official was identified last may by US media as Andrew Kim, a former South Korean citizen who moved to the US with his parents when he was 13 years old. According to sources, Kim joined the CIA after graduating from college and rose through the Agency’s ranks to serve its stations in Moscow, Beijing and Bangkok. His most recent overseas post was reportedly in Seoul, where he served as the CIA’s station chief —the most senior American intelligence official in the country.

Following his return to the US from Seoul, Kim reportedly retired, but returned last year to head the CIA’s new Korea Mission Center (KMC). The purpose of the specialized unit is to analyze Pyongyang’s ballistic missile and nuclear weapons programs, which the administration of US President Donald Trump considers as matters of priority for the White House. It was as head of the KMC that Kim reportedly met Mike Pompeo once he became Director of the CIA in January 2017. The two men worked closely together and it is believed that Kim’s role was instrumental in organizing the negotiations between Washington and Pyongyang that led to last summer’s historic high-level meeting between President Trump and Supreme Leader Kim Jong-un. According to American and South Korean media, Kim accompanied the then-CIA director on his secret trip to North Korea. He also accompanied Pompeo on his trips to North Korea once the Kansas Republican became Secretary of State.

The Yonhap News Agency said on Tuesday that Kim initially intended to leave his CIA post in the summer, but was persuaded by Secretary Pompeo to continue. However, he has now tendered his resignation, which will take effect on December 20. Citing “multiple sources”, including “a senior official at South Korea’s National Intelligence Service”, the Seoul-based news agency said that Kim plans to take up an academic post at Stanford University, adding that he intends to continue serving as an adviser to the secretary of state. Prior media reports have stated that “Kim is widely viewed as a hawk on North Korea”, so there are suspicions that his departure from the CIA stems from his disagreement with the policy of negotiation signaled by President Trump. However, the CIA has not commented on the Yonhap report. The South Korean agency said that the CIA is already reviewing candidates to succeed Kim.

Author: Joseph Fitsanakis | Date: 28 November 2018 | Permalink

French senior civil servant arrested on suspicion of spying for North Korea

Benoît QuennedeyA senior civil servant in the upper house of the French parliament has been arrested on suspicion of spying for North Korea, according to prosecutors. The news of the suspected spy’s arrest was first reported on Monday by Quotidien, a daily politics and culture show on the Monaco-based television channel TMC. The show cited “a judicial source in Paris” and said that France’s domestic security and counterintelligence agency, the General Directorate for Internal Security (DGSI), was in charge of the espionage case.

The senior administrator has been identified as Benoit Quennedey, a civil servant who liaises between the French Senate and the Department of Architecture and Heritage, which operates under France’s Ministry of Culture. Quennedey was reportedly detained on Sunday morning and his office in the French Senate was raided by DGSI officers on the same day. Quotidien said that he was arrested on suspicion of “collecting and delivering to a foreign power information likely to subvert core national interests”. The report did not provide specific information about the type of information that Quennedey is believed to have passed to North Korea. It did state, however, that a counterintelligence investigation into his activities began in March of this year.

Quennedey is believed to be the president of the Franco-Korean Friendship Association, the French branch of a Spanish-based organization that lobbies in favor of international support for North Korea. Korea Friendship Association branches exist in over 30 countries and are believed to be officially sanctioned by Pyongyang. They operate as something akin to the pre-World War II Comintern (Communist International), a Moscow-sanctioned international pressure group that advocated in favor of Soviet-style communism around the world. French media reported on Monday that Quennedey traveled extensively to the Korean Peninsula in the past decade and has written a French-language book on North Korea. News reports said that the French President Emmanuel Macron had been made aware of Quennedey’s arrest. The senior civil servant faces up to 30 years in prison if found guilty of espionage.

Author: Joseph Fitsanakis | Date: 27 November 2018 | Permalink

Four times more Sunni Islamist militants today than on 9/11, study finds

Al-Qaeda in YemenThere are four times as many Sunni Islamist militants today in the world than on September 11, 2001, despite an almost 20 year-long war campaign by the United States and its allies, according to a new report. Washington launched the ‘global war on terrorism’ in the aftermath of the 9/11 attacks that were perpetrated by al-Qaeda. In the ensuing years, American and other Western troops have engaged militarily in over a dozen countries, including Afghanistan, Iraq, Pakistan, Syria, Libya, Yemen, Somalia, Sudan, and the Philippines. But a new study by the bipartisan Center for Strategic and International Studies (CSIS) suggests that the West’s efforts to combat Sunni militancy are failing —and may even be making the problem worse. The report by the Washington-based think-tank states that the number of active Sunni Islamist militants today is as much as “270 percent greater than in 2001, when the 9/11 attacks occurred”.

Entitled “The Evolution of the Salafi-Jihadist Threat”, the 71-page report is one of the most extensive ever undertaken on this topic, drawing on information from data sets that date back nearly 40 years. It warns that, despite the rapid loss of territory suffered by the Islamic State in Iraq and Syria, armed Sunni militancy is “far from defeated”. The number of Salafi-jihadists —active proponents of armed fight against perceived enemies of Islam— has slightly declined in comparison to 2016, but it remains at near-peak levels over a 38-year period, says the CSIS report. It estimates that there are today as many as 230,000 Salafi-jihadists in almost 70 countries. Most of them are based in Syria (as many as 70,500), Afghanistan (as many as 64,000), Pakistan (up to 40,000), and Iraq (up to 15,000). Nearly 30,000 more are in Africa, primarily in Somalia, Nigeria and the Sahel region.

These fighters, and the groups they fight under, are far more resilient than Western antiterrorist strategists tend to assume, claims the report. They are also inadvertently aided by successive policy failures by the US and its closest Western allies. The latter focus primarily on the military aspects of counterterrorism campaigns, while ignoring the importance of improving local governance in territories where Sunni Islamism is rife, argues the report. Therefore, as the US and its allies continue to engage “in a seemingly endless [military] confrontation with a metastasizing set of militant groups”, they face seemingly endless waves of militants, who are becoming increasingly capable of resisting Western conventional military force. The report is available online in .pdf form, here.

Author: Joseph Fitsanakis | Date: 26 November 2018 | Permalink

Nerve agent used in Skripal attack ‘could have killed thousands’ say experts

GRUThe amount of poison smuggled into Britain for a near-fatal attack on Russian former spy Sergei Skripal was powerful enough to kill “thousands of people”, according those leading the investigation into the incident. Skripal, a former military intelligence officer, was resettled in the English town of Salisbury in 2010, after spending several years in a Russian prison for spying for Britain. But he and his daughter Yulia almost died in March of this year, after being poisoned by a powerful nerve agent that nearly killed them. The attack has been widely blamed on the Russian government, though the Kremlin denies that it had a role in it.

Investigators from Britain and other Western countries have identified the poison used in the attack on the Skripals as novichok. The term (meaning ‘newbie’ in Russian) was given by Western scientists to a series of rarely used nerve agents that were developed the Soviet Union and Russia between 1971 and the early 1990s. It is believed that the poison was smuggled into the United Kingdom hidden inside an imitation perfume bottle, which had been fitted with a custom-made pump used to apply the poison. British authorities have determined that the assailants sprayed the poison on the doorway —including the handle— of the Skripals’ house in Salisbury. They then discarded the perfume bottle, containing the leftover novichok, in a garbage can before leaving the country in a hurry. The bottle was eventually recovered by Salisbury resident Charlie Rowley. His partner, Dawn Sturgess, died of poisoning after she applied some of the contents of the bottle on her wrists. British government scientists have since been examining the contents of the perfume bottle found inside Sturgess’ home.

On Thursday, BBC Television’s Panorama investigative program aired an episode entitled “Salisbury Nerve Agent Attack: The Inside Story”. Among those interviewed was Dean Haydon, a British Deputy Assistant Commissioner who is leading the ongoing investigation into the Salisbury attack. He told Panorama that “a significant amount” of novichok was left behind by the assailants inside the discarded perfume bottle. The amount of poison in the discarded bottle could have been used to kill “thousands”, he said, adding that the way it was applied to the Skripals’ home was “completely reckless”. The BBC program’s producers also spoke to a British government chemical weapons scientist, identified only as “Tim”, who is credited with having identified the substance used on the Skripals. He told the program that less than 100g of novichok was used against the Skripals, leaving the vast majority of the nerve agent inside the bottle. Given that novichok is “one of the deadliest substances known”, which has a “unique ability to poison individuals at very low concentrations”, the scientist said he was shocked by the amount of poison that was smuggled into Britain by the assailants.

The assailants have been identified by British intelligence as Dr. Alexander Yevgenyevich Mishkin (cover name “Alexander Petrov”) and Colonel Anatoliy Chepiga (cover name “Ruslan Boshirov”). Both men are said to be employees of the Russian military intelligence agency known as the Main Directorate of the General Staff of the Armed Forces, commonly referred to as the GRU. Moscow denies that it had any role in the attack on the Skripals.

Author: Joseph Fitsanakis | Date: 22 November 2018 | Permalink

Norwegian spy service seeks right to break law during espionage operations

Royal Norwegian Ministry of DefenseNorway’s supreme legislature body is considering a bill that would offer immunity from prosecution to intelligence officers and informants who are authorized by the country’s spy service to conduct espionage. The bill has been proposed on behalf of the Royal Norwegian Ministry of Defense, which supervises the operations of the Norwegian Intelligence Service (NIS), Norway’s primary intelligence agency. The NIS operates primarily abroad and is the only institution of the Norwegian state that can be authorized by the government to break laws in foreign countries. However, supporters of the new bill point out that NIS overseas operations can also break Norwegian law. That is something that the proposed bill addresses, they argue.

The proposed bill offers immunity from prosecution to NIS case officers and their assets —either informants or foreign spies— who may commit offenses under Norwegian law, as part of authorized espionage operations. In its consultation note that accompanies the proposed bill, the Norwegian Ministry of Defense admits that a number of NIS operations “already violate existing Norwegian laws”. That is inevitable, argues the Ministry, because officers and informants who engage in espionage operations will often “act contrary to the stipulations of criminal law […] as part of their assignments”. They may, in other words, “do certain things that would be illegal if they were done not on behalf of the intelligence service”, states the consultation note.

The document does not provide details of the types of offenses that are committed in pursuit of intelligence operations, arguing that “the offenses that the NIS commits, as well as its methods, must remain secret”. It does, however, suggest that intelligence officers may make use of “false or misleading identities, documents and information”. They may also “smuggle large amounts of cash from the country”, which they will use to pay foreign assets. Given that these assets receive Norwegian taxpayers’ funds, and that some of them end up settling in Norway, it is important that their proceeds not be considered taxable income under Norwegian law, according to the Defense Ministry. By reporting their revenue to the Norwegian Tax Administration, these assets would make their NIS connection known, and thus blow their cover, the document states.

The Defense Ministry notes that the new bill “will have little legal significance”, as NIS espionage operations are generally shielded from prosecution under Norway’s existing legal codes. It will, however, formalize the NIS’ legal scope and allow the agency to assure its case officers that they can perform their missions without fearing arrest or prosecution, so long as they act within the parameters of their authorized missions. The spy agency will also be able to recruit more “informants, sources and contractors”, says the document.

Author: Joseph Fitsanakis | Date: 21 November 2018 | Permalink