Israel’s chief of staff says Hezbollah killed its own commander in Syria

Mustafa Amine BadreddineAn Israeli military official has repeated claims in the Arab media that the Lebanese Shiite group Hezbollah killed its own military commander in Syria, following a dispute with Iran. Mustafa Amine Badreddine, 55, an expert in explosives and former bomb-maker, was a senior military commander in the military wing of Hezbollah. He rose through the ranks of the organization to become a trusted adviser to Hezbollah’s Secretary General, Hassan Nasrallah. In 2011, the Special Tribunal for Lebanon, set up by the United Nations, charged Badreddine with organizing the assassination of Lebanese Prime Minister Rafik Hariri. Hariri was killed with over 20 other people in a massive bomb blast in Beirut, in February of 2005.

Soon after the outbreak of the Syrian Civil War, the leadership of Hezbollah dispatched Badreddine to the Syrian capital Damascus. His stated mission was to command thousands of Hezbollah troops, who fought under Iranian guidance in support of the Syrian President Bashar al-Assad. But on May 13, 2016, Badreddine was reportedly killed in Damascus, causing observers to describe his death as the biggest setback for the Shiite militant group since the 2008 assassination of its leading commander, Imad Mughniyeh. Initial reports in Hezbollah-controlled Lebanese media suggested that Badreddine might have been killed in an Israeli air attack. But a press statement issued later by Hezbollah said the commander had been killed as a result of an armed attack by Sunni rebels. However, on March 8 of this year, the Saudi-owned pan-Arab television network al-Arabiya said it had conducted its own investigation into Badreddine’s death, and had concluded that he was killed by Hezbollah itself. The network claimed that Hezbollah’s Secretary General Nasrallah had ordered Badreddine’s killing, after the Iranians demanded it. Apparently the Iranians wanted him killed because he disputed the authority of Major General Qasem Soleimani, commander of Iran’s Revolutionary Guard Corps, who is often credited with having saved the Syrian government from demise during the Civil War.

The claim that Badreddine was killed by Hezbollah was echoed on Tuesday by Lieutenant General Gadi Eisenkot, Chief of the General Staff of the Israel Defense Forces. Speaking to the Associated Press, Lt Gen Eisenkot said that reports from Arab media that Badreddine was killed by his own forces agreed “with intelligence we have”, referring to the Israeli military. It is worth noting that Israeli officials rarely comment on intelligence operations, including assassination operations, choosing instead to adhere to a “refuse to confirm or deny” policy.

Author: Joseph Fitsanakis | Date: 22 March 2017 | Permalink

US politics in uncharted waters as FBI announces probe into Russian activities

James ComeyMonday’s official announcement that an investigation is underway into alleged Russian involvement in the 2016 United States presidential election was an important moment in American political history. It exposed the chaotic state of American politics and added yet another layer of complexity in an already intricate affair, from which the country’s institutions will find it difficult to recover for years to come. This is regardless of the outcome of the investigation, which is being conducted by the Federal Bureau of Investigation. Even if it fails to produce a ‘smoking gun’, the very fact that the country’s chief counterintelligence agency is examining the possibility that a US president was elected with help from Russia, is an astonishing development without parallel in modern American history.

It is important to recognize that the FBI would never have initiated such a controversial and politically charged investigation without having concrete proof of Russia’s interference in last year’s presidential election. No agency of the US federal government would choose to dedicate enormous resources and personnel, and risk the political fallout that such a probe inevitably entails, without first having amassed indisputable evidence that necessitates it. Moreover, the FBI is not acting alone; its investigation almost certainly encompasses and incorporates similar probes carried out by other American security agencies, and possibly by agencies in allied countries, including the United Kingdom. It follows that the FBI investigation will undoubtedly confirm the existence of a systematic Russian intelligence operation that was aimed at influencing the outcome of last year’s American election.

As the present author has previously stated, it would be “extremely unusual and highly uncharacteristic of Russian spy agencies if they did not launch at least a rudimentary covert campaign to target the 2016 US presidential election […]. Indeed, the opposite would have been strange”. The central question, of course, is: what types of activities were part of the Kremlin’s covert campaign? Did it mostly involve the methodical production and dissemination of so-called ‘fake news’? Did it involve substantial funding of individual candidates or political parties? Or were there perhaps instances of extortion and blackmail of targeted individuals? These questions must be answered in full, and their inherent complexity explains fully why the FBI Director James Comey would not discuss details of the investigation on Monday.

Crucially, the FBI probe will have to answer conclusively the question of whether members of the administration of US President Donald Trump, or indeed the president himself, were implicated in the Kremlin’s actions. Did the president and his senior campaign team know that the Kremlin was —allegedly—assisting their efforts? If so, how did they know? And if not, did they deliberately ignore concrete warnings pointing to the contrary?

Every American, regardless of political persuasion, who genuinely cares about his or her nation’s political stability, hopes that the FBI probe finds no collusion between the Kremlin and the Trump campaign. However, there is an important sense in which, no matter the outcome of the investigation, serious damage has already been done. The reputation of American political institutions as a whole has been severely shaken, and mistrust between American civil society and its political institutions continues to rise exponentially. Meanwhile, it is safe to say that it will take months for the FBI’s probe to conclude. By then, the current chaotic state of American politics could be the a new permanently reality in Washington, a city that has witnessed much tumult in its history, though perhaps never as perplexing as the current crisis.

Author: Joseph Fitsanakis | Date: 21 March 2017 | Permalink

China has 5,000 spies in Taiwan, says official amidst espionage arrests

China and TaiwanA Taiwanese government official has alleged that China maintains an army of more than 5,000 spies in Taiwan, many of whom have infiltrated the highest levels of government and industry. The allegation came after two sensational arrests were made in Taiwan last week, of people accused of spying for Beijing. Taiwanese counterintelligence officers reportedly arrested a bodyguard of Annette Lu, Taiwan’s former vice president. The bodyguard, who has been identified in Taiwanese media as Wang Hong-ju, has been charged with receiving payments from his Chinese intelligence handler in return for providing information about Mrs. Lu. This incident followed another arrest, made earlier in the week, this time of a Chinese man who is believed to have initially come to Taiwan as a student. Zhou Hong-xu is accused of trying to recruit officials in the Taiwanese government by offering them money.

Following reports of the arrests, Taiwanese media quoted an official, who spoke on condition of anonymity, as saying that Beijing maintains “about 5,000 individuals” who spy in Taiwan. These agents are allegedly tasked with “collecting state secrets” in the island country, over which China claims ownership. The anonymous Taiwanese official said that authorities in Taipei had uncovered no fewer than 60 espionage plots linked to China since 2002. Less than a third of those were uncovered before 2009, said the official. The year is important, because it marks the time when communications and transportation systems between the two nations were reestablished after decades of mutual isolation. The ease with which people from the two countries can travel in each other’s territory has increased exponentially since 2009. But so have instances of espionage by China, said the Taiwanese official.

Asked about the alleged targets of Chinese espionage in Taiwan, the official said that nearly 80 percent of identified cases of espionage by Beijing’s agents were aimed at military targets, with only 20 percent focusing on the civilian sector. However, the apparent disparity in numbers does not mean that China shows more interest in Taiwanese military secrets. Rather, the Taiwanese military has better counterintelligence defenses and thus a higher detection rate than the country’s civilian sector, said the anonymous source.

Author: Joseph Fitsanakis | Date: 20 March 2017 | Permalink

Russian special forces troops seen in Egypt and Libya, say reports

Khalifa HaftarRussia may have become the latest country to deploy special forces soldiers in Libya, according to news reports citing anonymous United States officials. Late on Tuesday, the Reuters news agency reported that Russian special forces troops had been seen on the border between Libya and Egypt. The news agency said that the information came from “two US officials, who spoke on condition of anonymity”. The same article cited unnamed “Egyptian security forces”, who said that a 22-member Russian paramilitary team had set up an operations base in the Egyptian town of Sidi Barrani, which is located 60 miles from Libyan territory.

Libya has descended into a state of complete anarchy since the demise of the country’s dictator, Colonel Muammar Gaddafi. The Libyan strongman was killed in 2011, as a result of a popular uprising backed by Western powers and the North Atlantic Treaty Organization. Arguably the strongest faction in the ongoing Libyan Civil War is the so-called Tobruk-led Government, which is affiliated with the Libyan National Army. The commander of the Libyan National Army is Field Marshal Khalifa Haftar, an old adversary of Colonel Gaddafi, who lived in the US under Washington’s protection for many decades before returning to Libya in 2011 to participate in the war. The Tobruk-led Government is ostensibly supported by the US. However, its military wing, led by Haftar, operates semi-autonomously, and some believe that Haftar has aspirations to lead his own armed faction in Libya. Last November, Haftar visited Moscow, where he met with senior government officials, including Russian Foreign Minister Sergei Lavrov. There are reports that the Russian special forces troops alleged seen in Egypt are operating in support of Haftar.

Earlier this week, a spokesman for the Tobruk-led government told Russian media that Moscow had promised to provide it with funding and military aid. Earlier this year, it was confirmed that a number of Russian private security contractors were in Libya and were providing services to Haftar’s militias. But there are no confirmed reports of the presence of Russian government troops on the ground in Libya. On Tuesday, Moscow denied the Reuters report and accused “certain Western mass media” of “spreading false information from anonymous sources” in order to “smear Russia”.

Author: Joseph Fitsanakis | Date: 16 March 2017 | Permalink

Trump authorizes CIA to bring back regular use of drone strikes

DroneUnited States President Donald Trump has reportedly authorized the Central Intelligence Agency to bring back the routine use of lethal airstrikes by unmanned aerial vehicles (UAVs), which his predecessor, Barack Obama, curtailed in 2013. Washington began employing limited strikes by UAVs, otherwise known as drones, in the early 1990s, during the administration of President Bill Clinton. But it was under the Obama administration that the use of drone strikes reached an all-time high, with hundreds of such attacks documented after 2008. It is believed that Obama used this remote attack method to combat the Taliban and al-Qaeda, while at the same time keeping his promise of bringing back American troops from the Middle East and Central Asia. However, in 2013 the US president severely curtailed the controversial program, which some say damaged America’s image by inflicting civilian casualties.

But on Monday, The Wall Street Journal reported that President Trump had resuscitated the drone program and authorized the CIA to begin using Predator drones on a regular basis against identified targets in the Middle East and Central Asia. According to the newspaper, the president gave senior CIA project mangers the right to authorize drone strikes. Under the Obama administration, the president himself, or especially designated National Security Council officials, had to give the go-ahead before the CIA could carry out drone strikes around the world.

The Wall Street Journal said that President Trump made the decision on January 21, just hours after taking office, following a secret meeting with senior officials from the CIA. According to the report, the CIA requested some time to rebuild the program. But the agency has allegedly conducted at least one drone strike, which targeted Abu al-Khayr al-Masri, a known al-Qaeda senior commander in Syria, who was reputed to be a son-in-law of the late al-Qaeda leader Osama bin Laden.

Author: Ian Allen | Date: 15 March 2017 | Permalink

Russia possibly tried to kill Montenegro PM, says British foreign secretary

Boris JohsonBoris Johnson, the British foreign secretary has said in an interview that Russian spies may have orchestrated last year’s failed attempt to kill the then-prime minister of Montenegro, Milo Dukanović. Mr. Johnson, a senior figure in the Conservative Party of the United Kingdom, was a major contender for the prime minister’s position in 2016, after the administration of David Cameron collapsed under the weight of the Brexit vote result. Speaking on Sunday morning to reporter Robert Peston, of Britain’s ITV television network, Mr. Johnson said that the West should “engage” with Russia, but warned that it should also “beware” of Moscow’s “dirty tricks” in Europe and the United States.

The British foreign secretary spoke following reports that British intelligence services called an emergency meeting with representatives of the country’s major political parties, in order to warn them that Russia planned to use cyber-attacks to disrupt regional and national elections in the country. Mr. Johnson said that the government had “no evidence the Russians are actually involved in trying to undermine our democratic processes at the moment”. But he added that there was “plenty of evidence that the Russians are capable of doing that. And there is no doubt”, he went on, “that they’ve been up to all sorts of dirty tricks”. Some of those “dirty tricks”, said Mr. Johnson, targeted the former Yugoslav Republic of Montenegro, where last year there was “an attempted coup and possibly an attempted assassination”.

The British politician was referring to allegations made last October by authorities in Montenegro that “nationalists from Russia” and Serbia were behind a failed plot to kill the country’s then-Prime Minister Milo Dukanović and spark a pro-Russian coup in the country. The allegations surfaced after 20 Serbians and Montenegrins were arrested by police in Montenegro for allegedly planning a military coup against the government. The arrests took place on election day, October 16, as Montenegrins were voting across the Balkan country of 650,000 people. The plotters had allegedly hired a “long-distance sharpshooter” who was “a professional killer” for the task of killing Đukanović. After killing the Prime Minister, the plotters planned to storm the parliament and prompt a pro-Russian coup in Montenegro, according to authorities. In response to allegations that the coup had been hatched in neighboring Serbia, Serbian Prime Minister Vučić said that he would not allow Serbia to “act as the puppet of world powers”, a comment that was clearly directed at Moscow. Russia vehemently denied the allegations.

Meanwhile, Mr. Johnson is preparing to visit Moscow in a few days to meet with his Russian counterpart, Minister of Foreign Affairs Sergey Lavrov. He told ITV that he planned to deliver his “personal feeling” to Mr. Lavrov, which “is one of deep, deep sadness” about Russia’s foreign policy under President Vladimir Putin.

Author: Ian Allen | Date: 13 March 2017 | Permalink

Islamic State leader al-Baghdadi abandons Mosul, say intelligence sources

Abu Bakr al-BaghdadiThe leader of the Islamic State has abandoned the city of Mosul and is hiding in the desert zone of western Iraq, according to intelligence sources. Meanwhile Mosul, once the most populous city under the Islamic State’s control, is now reportedly being defended by a diminishing cadre of fewer than 3,000 Sunni militants, who are facing a 110,000-strong invading army.

Abu Bakr al-Baghdadi became the center of worldwide attention in July of 2014, when Islamic State troops swept rapidly through western Iraq and captured the region’s largest city, Mosul, in a spectacular coordinated attack. Soon after Mosul was captured by the Islamic State, al-Baghdadi led Friday prayers at Mosul’s Great Mosque and proclaimed himself caliph —emperor of the world’s Muslims. In the following months, the Islamic State reached the height of its power, commanding large expanses of land that stretched from the northern regions of Syria to the outskirts of Iraq’s capital Baghdad. Soon after al-Baghdadi’s public appearance in Mosul, the United States government set up a joint task force aimed at killing or capturing him. The group, which is still operational today, includes representatives from the Armed Forces, the National Security Council, and the Intelligence Community. Al-Baghdadi is believed to have stayed in Mosul, but has proven difficult to trace. He almost never uses electronic communications and is constantly on the move, sleeping at different locations every night.

Last October, US-backed Iraqi government troops, Shiite militias and Kurdish forces launched a large-scale military operation to recapture Mosul and drive out the Islamic State from the region. The assailants, whose combined forces are said to exceed 110,000 troops, reclaimed much of eastern Mosul earlier this year, and are preparing to launch a large-scale military advance on the western half of the city. While the operation to complete the recapture of Mosul is underway, American and Iraqi intelligence sources report that al-Baghdadi has not been public heard from since early November of last year. This leads many analysts to believe that the Islamic State leader has left the city and is now hiding in the vast and inhospitable desert that stretches along the Iraqi-Syrian border. Moreover, intelligence analysts claim that the Islamic State’s online activity has fallen sharply, to about half of what it was during the group’s peak in late 2014. This leads to the conclusion that the Islamic State is now increasingly focusing on essential functions aimed simply at the survival of the regime. The group has reportedly lost at least 3,000 fighters in Mosul, but an estimated 2,400 armed men have vouched to defend the city to the very end.

Author: Ian Allen | Date: 10 March 2017 | Permalink

FBI launches criminal investigation into WikiLeaks’ CIA disclosures

WikiLeaksThe United States federal government has launched a criminal investigation into the public disclosure of thousands of documents that purportedly belong to the Central Intelligence Agency. The documents were released on Tuesday by the anti-secrecy website WikiLeaks. They reveal what appear to be technical collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection “Vault 7”, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons allegedly used by the CIA to sabotage electronic devices and systems.

On Wednesday, former director of the CIA Michael Hayden told the BBC that the disclosure appeared “incredibly damaging”, because it revealed some of the methods that the CIA uses to acquire information. But some cybersecurity experts said that the techniques contained in the leaked documents did not appear to be uniquely advanced, and most focused on exploiting technical vulnerabilities that were generally known. Still, The New York Times reported on Wednesday that the CIA had begun to assess the damage caused by the release. The agency was also trying to contain the extent of the damage, and had even “halt[ed] work on some projects”, said The Times. Officials from the CIA are reportedly in communication with the Federal Bureau of Investigation, which on Wednesday launched a criminal investigation into the “Vault 7” release.

The main purpose of the FBI investigation is to find out how WikiLeaks acquired the files. The website said that the documents were leaked by a CIA contractor, which would imply that they were accessed from a server outside the CIA’s computer network. However, federal investigators are not excluding the possibility that the leaker of the information may be a full-time CIA employee. Reports suggest that the FBI is preparing to conduct hundreds, and possibly thousands, of interviews with individuals who are believed to have had access to the documents that were released by WikiLeaks. Meanwhile, neither the FBI nor the CIA have commented on the authenticity of the information contained in “Vault 7”. WikiLeaks said that Tuesday’s release, which it codenamed “Year Zero”, was the first part of several installments of documents that will be released under its Vault 7 program.

Author: Joseph Fitsanakis | Date: 09 March 2017 | Permalink

Files released by WikiLeaks show advanced CIA technical collection methods

Julian AssangeThousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems.

The information contained in the leaked documents is almost certainly genuine, and most likely belongs to the CIA —though many of the programs listed may be jointly run by the CIA and the National Security Agency (NSA). These programs, with names such as McNUGGET, CRUNCHYLIMESKIES, ELDERPIGGY, ANGERQUAKE and WRECKINGCREW, appear to be designed to compromise computer systems using a series of sophisticated methods that force entry or exploit built-in vulnerabilities or systems. Targets include popular communications systems like Skype and WhatsApp, smartphones produced by Google and Apple, commercial software like PDF and Microsoft Windows, and even so-called smart televisions that connect to the Internet.

The WikiLeaks revelations are most likely related to operations conducted under the auspices of the Special Collection Service (SCS), a joint CIA/NSA program that dates to the earliest days of the Cold War. The program was started by the United States Armed Forces but was eventually transferred to civilian hands and monitored by the CIA. It used advanced communications-interception facilities around the world to collect information. Over the years, the CIA collaborated with the NSA and developed many SCS projects targeting several foreign countries using technical and human means. In recent years the SCS has been primarily operated by the NSA, which oversees the program’s technical platforms.

WikiLeaks did not reveal the source of the documents. But it said that they had been “circulated [by the CIA] among former US government hackers and contractors” and that it was one of the latter that leaked them to the anti-secrecy website. A statement by WikiLeaks said that Tuesday’s release, which it codenamed “Year Zero”, was part one of several installments of documents that will be released under its Vault 7 program. The site also claimed that the information in “Year Zero” has “eclipsed the total number of pages published over the first three years of the Edward Snowden NSA leaks”. The CIA, the NSA and the White House have not commented on this development.

Author: Joseph Fitsanakis | Date: 08 March 2017 | Permalink

Malaysia assassination highlights North Korea’s network of front companies

North KoreaThe sensational assassination of Kim Jong-nam, half-brother of North Korea’s Supreme Leader Kim Jong-un, on February 13, revealed much about the current operational mindset of Pyongyang. But it also brought to light the shady network of front companies set up by the North Korean regime to facilitate the country’s illicit financial activities around the world. This extensive network permits Pyongyang to evade international sanctions against it, and to coordinate the activities of hundreds of clandestine operatives around the world. Through these activities, the reclusive country has been able to develop its weapons of mass destruction program unabated, despite concerted efforts by the United Nations to prevent it from doing so.

Writing for Forbes, Scott Snyder, senior fellow for Korea Studies and director of the program on US-Korea Policy at the Council on Foreign Relations, notes that the UN has for many years employed sanctions to “block international financial and material support for North Korean nuclear and missile development efforts”. But now the UN’s own experts have concluded that Pyongyang has been able to evade these sanctions so skillfully that it has “largely eviscerated the intent and impact of UN sanctions resolutions”. How has it done so? Mostly through a network of countries that routinely turn a blind eye to North Korea’s illicit activities. These include several countries in the Middle East, as well as Singapore, China, Indonesia, and Malaysia. Pyongyang maintains an extensive network of front companies in these countries, says Snyder, with the main purpose of enabling it to evade international sanctions against it.

Malaysia has been a primary hub of North Korean illicit activity. In that, Pyongyang has been crucially assisted by the fact that —until last week— North Korean citizens could travel to Malaysia without entry visas. Malaysia thus provides a useful base for dozens of North Korean front companies, such as Glocom, which ostensibly markets radio communications equipment, or Pan Systems Pyongyang, which just happens to trade in exactly the kind of commercial items that could be described as “dual-use goods” in UN sanctions resolutions. Pan Systems is connected to several Malaysian-based subsidiaries, including International Global Systems and International Golden Services, which, according to investigators, are operated by North Korean intelligence.

Many of these companies also serve as exporting and importing hubs for Pyongyang. In the last five years, several ships have been intercepted while carrying illicit cargo dispatched from North Korea or destined for the reclusive state. In one such instance in 2013, the Jie Shun, a Cambodian-registered ship with a North Korean crew, was found to be carrying over 30,000 rocket propelled grenades hidden under thousands of tons of iron ore. The shipment was intended for an “undisclosed Middle Eastern destination”, says Snyder and was traced to a firm called “Dalian Haoda Petroleum Chemical Company Ltd.”. Many of these mysterious firms are headquartered in China, registered in Hong Kong, but actually work on behalf of North Korea, often using banking facilities in Europe and the United States to conduct financial transactions.

Author: Joseph Fitsanakis | Date: 07 March 2017 | Permalink

Opinion: Trump’s astonishing wiretapping claims deepen volatility of US politics

Trump and ObamaThe absurdity of American politics reached new heights over the weekend, as President Donald Trump dramatically alleged on Twitter that his predecessor, Barack Obama, wiretapped his telephones last year. Even for a highly impulsive public figure known for his sensational and often-unsubstantiated allegations, Mr. Trump’s latest claims prompted a new sense of abnormality and astonishment in Washington. If the president is unable to prove his dramatic claims, his reliability will be further-eroded, and what little is left of his relationship with the American intelligence and national-security communities will disintegrate. If his allegations are proven, they will cause a scandal of unprecedented proportions from which American political institutions —including the presidency— will find it difficult to recover.

Mr. Trump appears to claim that Mr. Obama personally instructed the machinery of government to intercept the telecommunications of his campaign in the run-up to the 2016 US presidential election. But experts —including the present author, whose PhD focuses on government-sponsored wiretapping— correctly note that, barring a complete and systematic breakdown of law and q-quoteorder at the highest levels of the American government, Mr. Trump’s claims cannot possibly be true. American presidents have not been legally allowed to order wiretaps since 1978, when the Foreign Intelligence Surveillance Act (FISA) was established. Prompted by the abuse of executive power revealed through the Watergate scandal, FISA forces government agencies to seek the approval of specially mandated judges before installing wiretaps. If an agency like the Federal Bureau of Investigation (FBI) wants to wiretap an individual or group suspected of acting as agents of a foreign power, it must convince one of 11 federal district judges who rotate on the FISA court that the case warrants a wiretap order. Thus, before authorizing the wiretap, a FISA judge must be convinced by examining the available evidence presented before him or her.

Usually FISA counterintelligence cases involve foreign subjects who are suspected of operating in the US as unregistered agents of a foreign power —that is, spies or handlers of spies. However, if the case proposed by the FBI involves the targeting of American citizens’ communications, then the application for a wiretap must be personally reviewed by the US attorney general. Only if the attorney general approves the application does it get sent to a FISA judge. That is precisely why President Trump’s allegation is so explosive: if Mr. Obama personally directed a law enforcement or intelligence agency to wiretap the Trump campaign’s telecommunications, it would mean that a US president deliberately violated FISA regulations and kept the Department of Justice in the dark while wiretapping the telecommunications of American citizens. Read more of this post

MI6 to revert to old-fashioned ways of recruitment, says director

Alex YoungerBritain’s primary external-intelligence agency will revert to old-fashioned ways of recruiting employees, including the co-called “tap on the shoulder” method, according to its director. Known informally as MI6, the Secret Intelligence Service (SIS) was founded in 1908 to protect Britain’s national security by collecting intelligence from foreign sources. However, the agency has had difficulty recruiting a diverse group of people, and many still view it as a professional destination for a small wealthy elite, drawn primarily from Britain’s most prestigious universities such as Oxford and Cambridge.

MI6 is now trying to diversify the makeup of its employees, according to its director, Alex Younger. Younger, who is known at MI6 as ‘C’, gave an interview to British newspaper The Guardian on Thursday. He did so as the agency he leads prepares to increase its personnel numbers by 40 percent in the next four years. Last year, the British government announced that MI6’s personnel strength would grow from its current size of 2,500 employees to approximately 3,500 by 2020. The reason for the increase, said Younger, is that Britain is facing “more threats than ever before […] from terrorist groups and hostile states”. As a result, “the demands on our services [and] capabilities are on the up”, Younger told The Guardian in his first-ever interview with a national newspaper.

But MI6 would function more efficiently and achieve better results it if had a “more diverse workforce”, said Younger. Therefore, he said, the agency must go out of its way to “draw in a new cadre of black and Asian officers”. In doing so, the spy service would need to reach out to minority communities who are “selecting themselves out” of working for the British intelligence community. Useful in this process are what Younger called “old recruitment techniques”, such as the so-called “tap on the shoulder”. The term refers to the deliberate recruitment of individuals who will be approached by MI6 without having applied for employment with the agency. “We have to go to people that would not have thought of being recruited to MI6”, said Younger, adding that the “tap on the shoulder” method can be redeployed in order to increase diversity among MI6’s workforce and “reflect the society we live in”.

The spy agency is preparing to launch an aggressive recruitment campaign next week, aiming at bringing its overall size to 3,500 —a historic high, according to intelligence observers.

Author: Joseph Fitsanakis | Date: 03 March 2017 | Permalink

Islamic State faces imminent financial collapse, claims new study

ISIS meetingThe Islamic State is facing imminent financial collapse, according to a new study conducted by a London-based research group in association with one of the world’s leading international accounting firms. The recently launched report is entitled Caliphate in Decline: An Estimate of Islamic State’s Financial Fortunes. The analysis that forms the basis of the report was conducted by scholars at the International Center for the Study of Radicalization, a research center that operates out of the Department of War Studies at King’s College in London. The report’s authors were joined by financial analysts at Ernst & Young, a British-based company that is often referred to as one of the world’s ‘big four’ accounting firms.

The report challenges the widely accepted claim that the Islamic State is the wealthiest terrorist organization in history. Its authors argue that the organization’s wealth is connected to its function as “a quasi-state”, with a geographical territory under its control and a subject population that lives in it. Territorial control, say the report’s authors, allows the Islamic State to amass significant revenue from sources like direct and indirect taxation, extraction of natural resources, and confiscation of property from citizens, among others. Even though much of the Islamic State’s financial activity is hidden, the study uses open sources to make the claim that the group’s income in 2014 was close to $2 billion. Last year, however, the overall income amassed from all sources dropped to less than $900 million, an estimated reduction of 45 percent, say the researchers.

The reason for the drop is that the financial revenue model of the Islamic State is directly linked to its territorial control. In comparison to the peak of its power in the spring of 2014, the Islamic State has today lost control of over 60 percent of its territory in Iraq and nearly a third of its territory in neighboring Syria. As coalition forces are beginning to retake Mosul, the Islamic State is facing the potential loss of the caliphate’s commercial capital. These developments will continue to seriously erode the group’s tax base and severely limit its revenue streams. There are no signs, say the researchers, that the Islamic State has been able to devise new forms of revenue streams that are not connected to direct territorial control. However, the authors of the study warn that a potential financial collapse of the Islamic State will not prevent the organization from carrying out terrorist activities in the Middle East and beyond.

Author: Joseph Fitsanakis | Date: 01 March 2017 | Permalink

Analysis: African intelligence run amok and prospects for reform in The Gambia

Adama BarrowFor a very long time, the field of Intelligence Studies has been dominated by analysis of the Five Eyes community, which is comprised of the United States, Great Britain, Australia, New Zealand, and Canada. In reality, that study is more often the study of intelligence in the US and the UK. While not entirely fair to characterize this as Western prejudice —access to data is better in these two countries and intelligence scholars and analysts for the most part do not fear retribution or reprisal— more voices need to come forward to consider intelligence and its role on societies beyond the Five Eyes.

There has been slow but gradual progress in getting the discipline to understand this fact, to understand how important the study of intelligence is outside of the Five Eyes. In recent years, particular emphasis has been paid to Russia, China, Pakistan, Iran, and Israel, just to name several case studies. But the countries of Africa, unfortunately, have largely remained a near-blank analytical slate when it comes to deeper work on the continent’s various intelligence communities. As recent events in The Gambia show, that absence needs to be rectified at a time when some deeply disturbing aspects of state development and political stability hang in the balance.

A few days ago, nine intelligence officers, among them the ex-head of the Gambian National Intelligence Agency (NIA), were arrested and charged with the murder of Ebrima Solo Sandeng, a top political opposition figure. Sandeng, the National Organizing Secretary of the United Democratic Party (UDP), died in custody after being arrested for his participation in a protest demanding q-quoteelectoral reforms back in April of 2016. The protests were geared to influencing the December 2016 presidential election, which ultimately saw the defeat of incumbent President/Strongman Yahya Jammeh to Adama Barrow. Jammeh had corruptly governed the country since rising to power as a young military officer in a bloodless military coup in 1994.

The official docket accused Yankuba Badjie and eight other members of the NIA of “conspiring amongst themselves to take part in the murder of Solo Sandeng”. Back on April 14, 2016, Sandeng and five other members of the UDF party were arrested by police and taken to Mile 2 Prison where, after two days of torture, Sandeng died of shock and respiratory failure. Read more of this post

Swedish intelligence says it identified foreign spies searching for secrets

Sweden militaryThe military intelligence service of Sweden warned last week that there were increasing incidents of espionage perpetrated against Sweden by operatives identified “beyond doubt” as agents of foreign powers. In its annual report for 2016, the Swedish Military Intelligence and Security Service (MUST) said large numbers of spies were detected around “sensitive installations” mostly of a military nature. Headed by an Army general, MUST is responsible for military intelligence and counterintelligence in Sweden. Every year it produces a report of its activities for the Swedish government and defense establishment, and also publishes a declassified version. Its latest report warns about growing attempts by foreign countries to “gather intelligence about Sweden’s defense assets and capabilities”.

On Friday, Swedish newspaper Svenska Dagbladet published an interview with senior MUST official Jan Kinnander. He told the paper that MUST was able to identify beyond doubt that certain individuals were “connected to the intelligence services of foreign states”. These persons traveled to Sweden “under false pretenses”, according to the official. A few of them were diplomats, said Kinnander, while most attempted to travel around the Scandinavian country using “conspiratorial methods”. Many were detected prowling around government installations that are linked to Sweden’s national defense while having “no reasonable cause” to be there, said Kinnander.

When asked to identify the countries that engage in espionage against Sweden, Kinnander said he could not elaborate, except to say that MUST linked the alleged spies with “several countries, including Russia”. In December of last year, MUST Director Gunnar Karlsson told Swedish media that Russia was a leading perpetrator of intelligence operations against Sweden. These operations included active measures involving propaganda, deception and other psychological activities, he said. In recent years, the Swedish authorities have arrested Polish, Lithuanian and other Eastern European nationals, allegedly because they were seen photographing Swedish military installations.

Author: Ian Allen | Date: 27 February 2017 | Permalink