Closed-door trial of Soviet/Russian sleeper agents starts in Germany
January 16, 2013 11 Comments
By JOSEPH FITSANAKIS | intelNews.org |
A married couple accused of spying on Germany on behalf of the Soviet Union and Russia for over two decades has gone on trial in Stuttgart. Andreas Anschlag, 54, and his wife, Heidrun, 48, were arrested in October 2011 by GSG-9, the elite counter-terrorism and special operations unit of the German Federal Police. They were later charged with having spied since at least 1990 for the Soviet KGB’s First Chief Directorate and its post-Soviet successor organization, the SVR. German federal prosecutors also accuse the couple of document forgery, since their Austrian passports, which they used to enter West Germany from Mexico in 1988 (Andreas) and 1990 (Heidrun) are believed to be counterfeit. There is also speculation that the couple’s surname may in fact be an alias given to them by their intelligence handlers. Upon entering West Germany in 1988 and 1990, the Anschlags initially settled in Aachen, on the German-Belgian border, before moving to Meckenheim, a small town with a population of less than 30,000 located a few miles southwest of Bonn. They concentrated on blending into German society, while raising their son daughter and leading what their neighbors describe as a “discreet life”. Over the years, they managed to recruit a number of informants, including a Dutch diplomat identified by authorities in Holland only as ‘Raymond P’. The diplomat, who was arrested last June, is believed to have given the Anschlags nearly 500 classified documents originating from the German armed forces, the North Atlantic Treaty Organization and the European Union. Read more of this post
By IAN ALLEN | intelNews.org |


















Sophisticated cyberespionage operation focused on high-profile targets
January 17, 2013 by Joseph Fitsanakis 3 Comments
After Stuxnet and Flame, two computer programs believed to have made cyberespionage history, another super-sophisticated malware has been uncovered, this time targeting classified computer systems of diplomatic missions, energy and nuclear groups. The existence of the malware was publicly announced by Russian-based multi-national computer security firm Kaspersky Lab, which said its researchers had identified it as part of a cyberespionage operation called Rocra, short for Red October in Russian. The company’s report, published on Monday on Securelist, a computer security portal run by Kaspersky Lab, said that the malware has been active for at least six years. During that time, it spread slowly but steadily through infected emails sent to carefully targeted and vetted computer users. The purpose of the virus, which Kaspersky Lab said rivals Flame in complexity, is to extract “geopolitical data which can be used by nation states”. Most of the nearly 300 computers that have so far been found to have been infected belong to government installations, diplomatic missions, research organizations, trade groups, as well as nuclear, energy and aerospace agencies and companies. Interestingly, the majority of these targets appear to be located in Eastern Europe and former Soviet republics in Central Asia. On infected computers located in North America and Western Europe, the Rocra virus specifically targeted Acid Cryptofiler, an encryption program originally developed by the French military, which enjoys widespread use by European Union institutions, as well by executive organs belonging to the North Atlantic Treaty Organization. Read more of this post
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with Acid Cryptofiler, Central Asia, computer hacking, cyberespionage, cybersecurity, Eastern Europe, Kaspersky Lab, News, Rocra, Russia