Mounting concern in the EU about Indian black operations targeting dissidents

BLACK OPERATIONS, WHICH AIM to liquidate targeted individuals, are once again the subject of various reports. The primary focus tends to be on Russian intelligence agencies targeting alleged traitors worldwide. Michael Weiss, US publisher of The Insider, spoke in a recent interview of “more than 60 mysterious deaths of Putin’s enemies in Russia and Europe since the Ukraine war began”.

Somewhat-less-black operations, in which individuals —usually living abroad— are not killed, but intimidated, persecuted, threatened, or roughed up, appear to be increasingly utilized as a tool by certain states that have little tolerance for domestic political opposition. Ken McCallum, Director General of Britain’s Security Service (MI5), stated on 8 October 2024 that, “since January 2022, with police partners, we have responded to twenty Iran-backed plots presenting potentially lethal threats to British citizens and UK residents”.

Back in September 2023, The Guardian reported having spoken to 15 Iranian activists living in the United Kingdom, France, Germany, Spain, Switzerland and Sweden, who were being persecuted and intimidated, or had been threatened in various ways by the Iranian regime’s henchmen and its intelligence services. There are numerous similar examples of journalists and dissidents who have been a thorn in the side of the Turkish government for several years now. In addition to threats and violence, there are reports of abductions by Turkey’s National Intelligence Organization (MIT). In recent years, China too has increasingly relied on intimidation directly in the West, and has also engaged Western investigators and helpers for this purpose.

One concerning development is the fact that these states are apparently increasingly resorting to the help of members of Outlaw Motorcycle Gangs (OMCG), members of drug cartels, and other criminals. Regardless of whether it is for purposes of sabotage, threats, or assassinations, shady figures —typically apolitical— are undertaking missions on behalf of the intelligence agencies of authoritarian states on European soil.

The Case of India

Another country that has been in the spotlight for some time is India, which has historically maintained a low profile in the West, in terms of black operations. Western intelligence agencies could have predicted that there would be an escalation —i.e. Indian black operations on Western soil— which could lead to the liquidation of alleged or actual terrorists. If one observes the reports of Indian intelligence agencies and analysts on the activities of its mortal enemy, Pakistan, and its intelligence agency, the Inter-Services Intelligence (ISI), it quickly becomes apparent that India is less and less willing to tolerate what it regards as terrorism sponsored by Pakistan. This applies particularly to individuals and organizations operating from abroad. Read more of this post

Analysis: The fate of Russia’s military bases in Syria seems highly uncertain

Khmeimim Air Base SyriaTHERE ARE CONFLICTING REPORTS about the fate of Russia’s military bases in Syria, following the complete collapse of the 54-year-long Assad dynasty. Late on Sunday it was announced on Russian state media that the Kremlin had extended Bashar al-Assad and his family political asylum “on humanitarian grounds”. Attention quickly turned to the fate of the Russian embassy in the capital Damascus and the Russian military facilities in Tartous and Khmeimim.

It is difficult to overstate the strategic significance of the Russian military facilities in Syria, some of which date as far back as 1971, when Hafez al-Assad, Bashar al-Assad’s father, assumed power in the country. The Russian naval base in Tartous is currently the only Russian military facility outside of the former Soviet Union. Furthermore, it constitutes the sole warm-port fueling and repair facility that is exclusively available to the Russian Navy. It is home to the Russian naval group in Syria, which consists of a submarine and five warships.

Likewise, the Khmeimim Air Base in Syria’s Latakia province is home to dozens of Russian fighter jets, which have been stationed there since 2015, ostensibly in order to protect the Syrian government from the Islamic State. However, Russia regularly uses the Khmeimim Air Base to transport troops and war materiel to Africa, and to project air power in the Mediterranean, through the presence of several bomber aircraft. The latter can be found, not only in the Khmeimim Air Base, but also in the Syrian military airports of Homs and Palmyra.

But these two military airports are now in the hands of the Hayʼat Tahrir al-Sham (HTS) forces that have captured much of Syria in the past two weeks. It is doubtful that the Russian Aerospace Forces will be able to use them from now on. Moreover, there are reports that Moscow will be forced to engage in a strategic withdrawal of the entirety of its military forces from Syria within hours, if not days.

On Sunday, the Russian Ministry of Foreign Affairs issued a dismissive statement claiming that, although Russian troops in Syria had been placed on high alert, “no serious threat to their security” had been detected. According to the Reuters news agency, the Russian government had been in communication with the leadership of the HTS leadership for several days. As a result of this communication, an agreement had allegedly been struck, which guaranteed “the safety of Russian military bases and diplomatic institutions in Syria”. Read more of this post

British soldier who spied for Iran found guilty of espionage and terrorism

Wandsworth prisonDANIEL KHALIFE, A BRITISH soldier who spied for Iran, has been found guilty of espionage and terrorism, in a case that has revealed serious vulnerabilities in the British security clearance-vetting system. The then-20-year-old Khalife was arrested in January 2022 while serving on active duty in Staffordshire, in Britain’s Midlands region. He was charged with violating the Official Secrets Act 1911 and the Terrorism Act 2000.

Prior to his arrest, Khalife was reportedly seen by his fellow soldiers and superiors as a promising soldier. Having joined the British Army at 16, he was quickly promoted to lance corporal (the lowest ranking of a non-commissioned officer) and cleared to work in the area of signals intelligence. He had also expressed a strong interest in joining the Special Air Service (SAS), which are the British Army’s special forces.

However, on November 9, 2021, Khalife voluntarily called the national security concerns hotline of the British Security Service (MI5). He told the operator on the other end of the line that he was a British soldier who had been spying for Iran for “more than two years”, but had now decided to become a double agent by cooperating with the British government. Khalife called again, and although he did not identify himself during the telephone conversations, MI5 was able to track him.

It has since become known that Khalife began spying for Iran when he was just 17 years old, shortly after joining the British Army. Over the next two years, Khalife provided his Iranian handlers with information about the identities of SAS personnel, military computer systems, as well as government surveillance programs and hardware, including unmanned aerial vehicles. Throughout that time, he communicated with his Iranian handlers via the Telegram instant messaging service, or via dead drops in Britain, as well as during trips abroad.

Shockingly, Khalife was temporarily able to escape justice twice following his arrest. In January 2023, he disappeared while on bail. He was found after nearly a month, living in a stolen van, which he had converted into a rudimentary camper. In September of that year, Khalife escaped from Wandsworth prison (pictured) in southwest London, by hiding beneath a delivery vehicle. He was captured three days later and eventually taken to court, where he was convicted and is now awaiting sentencing.

According to reports, British authorities are still unable to piece together the entirety of the information that Khalife shared with the Iranians. Consequently, the full extent of the damage he caused to British national security remains unknown. What is clear is that the Khalife case has exposed serious vulnerabilities in the security clearance-vetting process, which is “lacking in a lot of ways” —not least in the fact that it relies largely on self-reporting, as one expert told The Guardian newspaper on Saturday.

Author: Joseph Fitsanakis | Date: 02 December 2024 | Permalink

White House holds emergency meeting with telecoms over ‘massive’ Chinese breach

VerizonTHE WHITE HOUSE HELD an emergency meeting on Friday with senior telecommunications industry officials to discuss the fallout from a Chinese cyber espionage operation described as “massive” by experts. The existence of the operation was revealed last month by Microsoft engineers, who claimed that it was orchestrated by Salt Typhoon, a Chinese government-linked hacker group.

On Thursday, following a briefing provided by intelligence officials, Senator Mark Warner (D-VA), who chairs the United States Senate’s Select Committee on Intelligence, referred to the Chinese breach as “far and away the most serious telecom hack in [American] history”. Warner added that the volume of data the Chinese hackers were able to collect on “important American officials” was alarming, but that the extent of the intrusion was significantly broader than initially thought and compromised the privacy of telephone users across the United States.

According to reports, the breach affected a host of American telecommunications service providers (TSPs), including the three largest —T-Mobile, Verizon, and AT&T. The initial breach compromised the system employed by the TSPs to facilitate communications interception requests by government agencies following the issuance of court warrants. Eventually, however, the hackers were eventually able to exploit antiquated software and hardware in the United States’ national telecommunications network in order to target a wide array of users.

The extent of the damage caused by the breach remains unknown, as very little about it has been shared by the White House or the telecommunications industry. Nevertheless, it appears that the hackers selected telephone service users with senior current or former posts in government, including President-Elect Donald Trump. The hackers were reportedly able to access the metadata, and even content, of all unencrypted telephone calls and text messages to and from these users.

Friday’s meeting at the White House was reportedly convened by National Security Adviser Jake Sullivan and co-led by Anne Neuberger, who is serving as Deputy National Security Adviser for Cyber and Emerging Technology. The names of telecommunications industry executives that attended the closed-door meeting were not provided to the media.

Author: Joseph Fitsanakis | Date: 25 November 2024 | Permalink

Russia using nontraditional means to gather intelligence, Finland warns

SUPO FinlandRUSSIA’S NEED TO GATHER intelligence from Scandinavian targets has increased considerably since Finland and Sweden joined the North Atlantic Treaty Organization (NATO), prompting Moscow to seek nontraditional means of collecting intelligence, according to Finland’s spy agency. A new report by the Finnish Broadcasting Company (Yle) relays a warning by the Finnish Security and Intelligence Service (SUPO) that Russian spies are increasingly operating in Scandinavia without relying on diplomatic protection.

Human intelligence (HUMINT) operations are typically carried out of diplomatic facilities by intelligence officers who enjoy various degrees of diplomatic immunity. Such protections are seen as crucial for the safety of intelligence personnel, who tend to engage in illegal activities while stationed abroad. However, the number of Russian intelligence officers who are based in diplomatic facilities in Finland and elsewhere in Scandinavia has “significantly decreased” in recent years, according to the Yle report.

The reason for the decline in numbers rests with the numerous expulsions of Russian diplomatic personnel —which include intelligence officers— that took place throughout Europe in the months following Russia’s February 2022 invasion of Ukraine. Since then, Finland is one of dozens of European countries that have repeatedly denied Russia’s requests for the issuance of diplomatic visas. As a result, Russian embassies and consulates in Finland remain understaffed and mostly devoid of intelligence personnel.

In response to this new reality, the Kremlin has been experimenting with using nontraditional HUMINT collectors. The latter are not based in diplomatic facilities and are not protected by diplomatic immunity. Such nontraditional intelligence collectors operate as “journalists or researchers”, according to SUPO. At the same time, Russian intelligence agencies increasingly target for recruitment Finns who life in Russia, or try to recruit them while they are traveling elsewhere in Europe.

Lastly, Russian intelligence agencies are systematically hiring criminals to carry out specific tasks on behalf of the Kremlin, in return for money. Such criminals include computer hackers, who are attracted by the Russian state. Indeed, the Russian government is systematically “providing favorable conditions” for computer hackers to operate out of Russian territory. They receive money and protection in return for letting the Russian state use them as a cover for cyber espionage, sabotage, and influence operations.

Author: Joseph Fitsanakis | Date: 18 November 2024 | Permalink

Israeli couple who spied for Iran made ample use of digital applications

Israel and IranTHE ISRAEL SECURITY AGENCY (ISA) recently announced the arrests of an Israeli couple of Azeri origin on suspicion of spying for Iran. The couple, both 32 years old, were allegedly recruited by an Iranian handler of Azeri origin named Elshan Agheev. As part of their activities, and for about two years, the couple gathered intelligence on critical infrastructure and security sites in Israel, and even conducted surveillance on an academic working for the Institute for National Security Studies, allegedly in order to kill her.

The case demonstrates how software that is easily accessible on the Internet makes it possible to encrypt information communicated between a handler and an agent, as well as how money is transferred to the agent. The official indictment reveals details about the couple’s modus operandi, including the identity of the particular software the spies used to communicate with their Iranian handler.

One of the applications the couple used is Zangi, which facilitates the exchange of encrypted instant messages. According to the company’s website, Zangi offers voice and video calling, text messaging, and file transfer services “without registration and without data collection”. In fact, according to Zangi, the data is saved on the user’s device only. In addition to using the Zangi application, the couple also appear to have used the Zolotaya Korona money-transfer platform. The couple allegedly used the platform in order to receive payments by their Iranian handlers, and to transfer funds to other parties involved in Iranian-led espionage activities inside Israel.

Another application allegedly used by the couple is Ecos Dos, a digital wallet for storing and transferring digital currencies. Ecos Dos is a software wallet that can be installed on a computer or mobile phone. It supports a wide variety of crypto-currencies and is used to store and transfer cryptocurrencies. It is known for its simplicity of use and friendly interface. It is popular among users who wish to maintain anonymity when transacting in digital currencies. It does not require identifying a user’s details when operating, so anyone can create an account and receive funds anonymously.

The suspects are also believed to have used a software called Encryptor in order to encrypt information. This software allows files and folders to be encrypted so that only those who have the encryption key can open them. The couple allegedly used Encryptor to encrypt the information they collected before passing it on to their Iranian handlers, thus making it difficult for Israeli authorities to decipher the information.

The use of these applications attests to the sophistication of the Iranian spy network that was recently busted in Israel, and its efforts to hide its activities inside the Jewish state. The recent indictment against the couple details a collection of serious security offenses, including aiding the enemy in war and providing information to the enemy to harm the security of the state. Iran is clearly stepping up its efforts to recruit Israeli citizens for espionage and terrorist activities.

Author: Avner Barnea | Date: 11 November 2024 | Permalink

Dr. Avner Barnea is research fellow at the National Security Studies Center of the University of Haifa in Israel. He served as a senior officer in the Israel Security Agency (ISA). He is the author of We Never Expected That: A Comparative Study of Failures in National and Business Intelligence (Lexington Books, 2021).

Review calls for Europe-wide intelligence agency to prevent hybrid attacks

European Commission report coverA HIGHLY ANTICIPATED REVIEW of the European Union’s intelligence readiness to face conventional and hybrid threats has called for the establishment of a dedicated Europe-wide intelligence agency. Such an agency must rely on EU member states “trust[ing] each other” in order to confront increasingly aggressive espionage, sabotage, and other types of threats by outside actors like Russia, the report said.

Ursula von der Leyen, who presides over the EU’s powerful executive branch, known as the European Commission, assigned the review last March. It was led by Sauli Niinistö, former president of Finland, who was tasked with providing a set with proposals aimed to enhance the resilience of the EU in the face of current threats in the tactical and strategic domains. The final report, available here in PDF, was made publicly available in Brussels on Wednesday.

Among several recommendations, the report proposes the establishment of a “fully fledged intelligence cooperation service at the EU level”, which could serve the EU’s urgent “strategic and operational needs”. Such needs include countering espionage threats within EU institutions, as well as devising Europe-wide networks of defense against sabotage targeting EU critical infrastructure. Part of the new agency’s mission should be to prevent foreign intelligence services from operating “anywhere in the EU”, the report said.

In her public statement upon receiving the report, President von der Leyen stated that the EU should begin to think pre-emptively, rather than reactively, about conventional and unconventional threats to its security. Such a process should begin through “improving the flow of information gathering and intelligence gathering”, initially through existing EU-wide security bodies, such as the European Union Intelligence and Situation Centre (EU-IntCEN) and the European Centre for Information Policy and Security (ECIPS).

Author: Joseph Fitsanakis | Date: 04 November 2024 | Permalink

Israeli citizens arrested on suspicion of working for Iranian intelligence

Ronen Bar Israeli Security AgencyTHE ISRAELI SECURITY AGENCY (ISA) has announced the arrest of 18 Israeli citizens suspected of working for Iranian Intelligence. Among them are seven Israelis, who immigrated to Israel from Azerbaijan, and are suspected of having been in contact for two years with Iranian intelligence. Some of the seven were caught carrying out surveillance against a senior Israeli Air Force officer, whom they were reportedly planning to assassinate.

Israeli authorities accuse the suspects of photographing and collecting information on military bases and facilities, including Air Force bases, Iron Dome battery sites, a power plant, and other energy infrastructure facilities. The suspects are also accused of having received from their Iranian handlers a set of maps of Israeli strategic sites, including the Golani Brigade’s training base, where four Israeli soldiers were killed by a drone attack last week. In over two years, the suspects allegedly performed approximately 600 missions under the direction of two handlers from Iranian intelligence. They did so in return for hundreds of thousands of shekels, which were paid to them in cash and various crypto-currencies.

Another Israeli citizen, who was arrested on suspicion of spying for Iranian intelligence in return for payments, has been named as Vladimir Varehovsky, 35, from Tel Aviv. Among other tasks, Varehovsky is suspected of gathering information about an Israeli scientist, whom he agreed to murder in exchange for a $100,000 payment. The suspect had reportedly acquired weapons for the assigned task, but the ISA arrested him before he could carry it out.

In another counterintelligence operation, the ISA arrested seven young Palestinians from the east of Jerusalem, who have been charged with working for Iranian Intelligence. The main suspect recruited the other six to carry out tasks for a fee. Tasks included setting cars on fire, gathering information about a city mayor in Israel, and plotting to assassinate one of the country’s top scientists. The suspects used social media for recruitment purposes. They were reportedly arrested before they were able to execute their missions. Read more of this post

Possible Russian role probed in incendiary devices found in Britain and Germany

DHLAUTHORITIES IN BRITAIN AND Germany are reportedly investigating the possibility that the Russian intelligence services may be behind two fires that occurred in shipping warehouses last summer. The fires occurred in late July in facilities belonging to DHL, a German logistics firm headquartered in Bonn.

On September 1, the German government issued a warning about unknown suspects allegedly shipping “unconventional incendiary devices” throughout Europe. The warning referenced a fire that occurred at a DHL logistics center in the east German city of Leipzig. Germany’s Federal Office for the Protection of the Constitution (BfV) warned at the time that “further incendiary incidents” were anticipated, but provided no further details.

Late last week, British newspaper The Guardian reported that an incident like the one that occurred in Leipzig had taken place in a DHL warehouse in Minworth, a suburb of the city of Birmingham, located in the British Midlands region. In subsequent reporting, the paper alleged that British and German authorities have been investigating a link between the two incidents. Moreover, authorities are reportedly probing the possibility that the incidents may be part of a wider campaign by Russian military intelligence to sabotage Western European transportation and shipping networks.

Meanwhile, Lithuanian media revealed on Friday that a suspect had been arrested in Lithuania in connection with the two fires in Britain and Germany. The reports suggested that the two incendiary devices had been shipped from Lithuania by the same individual. However, there have been no updates about who may be behind the apparent sabotage campaign.

Author: Joseph Fitsanakis | Date: 21 October 2024 | Permalink

US-based Afghan man who planned election-day attack ‘worked as CIA guard’

CIAAN AFGHAN NATIONAL BASED in the United States, who was allegedly planning to carry out a terrorist attack during the upcoming Election Day, previously worked for the Central Intelligence Agency (CIA) as a guard, reports claim. According to the US Department of Justice, Nasir Ahmad Tawhedi, 27, was arrested by the Federal Bureau of Investigation (FBI) on October 7, alongside a number of co-conspirators who have so far not been named.

Tawhedi’s arrest occurred shortly after he purchased two AK-47 assault rifles, 10 magazines, and several rounds of ammunition from an FBI employee posing as a seller of the merchandise. The suspect allegedly told at least two FBI informants working on the case that he intended to use the weaponry to target “large gatherings of people” on Election Day. Tawhedi is also reported to have boasted that he expected to die in the attack. His indictment suggests that he planned to carry out the attack on behalf of the Islamic State of Iraq and al-Sham (ISIS).

Tawhedi has lived in the US for a little over three years, having arrived on US soil soon after Washington began withdrawing its forces from Afghanistan, following a two decades-long military campaign. Like thousands of other Afghans, Tawhedi was able to enter the US through an emergency entry privilege known as a “humanitarian parole”. He then applied for a Special Immigrant Visa, which is customarily offered by the US government as a form of protection to foreign nationals who have provided services to its military and security agencies. According to reports, Tawhedi’s Special Immigrant Visa application had been approved and was in the last stages of being officially issued.

Last week, the American television network NBC reported that Tawhedi had been employed as a guard by the CIA in Afghanistan. The network cited “two sources with knowledge of the matter”. Later on the same day, another American television network, CBS News, said it had been able to independently verify the earlier report by NBC. It is notable that, according to both NBC and CBS, Tawhedi worked as a guard for a CIA facility, rather than an informant or an asset for the intelligence agency.

The recent media reports about Tawhedi have yet to answer the question of whether he had been communicating with identifiable ISIS handlers, or whether he was independently radicalized through his online activity. It is also not known whether Tawhedi was a supporter or an affiliate of ISIS during his stint with the CIA, or whether he became radicalized after arriving in the US in September 2021.

Author: Joseph Fitsanakis | Date: 14 October 2024 | Permalink

Leaked documents reveal plans for extensive Russian influence campaign in Israel

2023 Israeli judicial reform protestsLEAKED INFORMATION PUBLISHED BY leading German media outlets has revealed Russia’s plans for an influence campaign targeting Israel. The information was leaked earlier this month by the German newspaper Süddeutsche Zeitung and German television stations Norddeutscher Rundfunk (NDR) and Westdeutscher Rundfunk (WDR), as well as by Israeli news outlets. It allegedly came from Social Design Agency (SDA), a Moscow-based firm hired by the Kremlin, which operates in Israel and several countries in the West.

Founded in 2017, the SDA is reportedly one of a host of firms and organizations that are collaborating with Russian intelligence in its efforts to influence public opinion worldwide. Earlier this year, the United States imposed sanctions on SDA, “for providing services to the government of Russia in connection with a foreign malign influence campaign”. The SDA’s founder is Ilya Gambashidze, who is said to be in direct contact with Russian President Vladimir Putin and other Kremlin officials.

Israel has been a central target of SDA’s Russian influence campaign. The country’s internal situation, with mass demonstrations against the legal reform is “perfect for launching a campaign to influence public opinion”, an SDA document from 2023 reads. The document accurately describes the political and social situation in Israel and names a number of influential Russian expatriates whose activities should be monitored.

According to the leaked documents, the purpose of the planned campaign was to raise support for Russia in its war against Ukraine, and strengthen the proportion of Israelis who espouse anti-Ukrainian sentiments. Another central goal was to ensure that no party in the Knesset —the IsraeliQ Quote parliament— would support a possible transfer of military aid to Ukraine.

From the documents, it appears that the conclusions formulated by the SDA were infused into around 50 cartoons distributed every month on social networks, around 20 fictitious articles appearing on websites pretending to be legitimate, and many reactions on various social networks. Among other things, the company distributed through paid ads on Facebook cartoons showing Ukrainian President Volodymyr Zelensky burning the Israeli flag, as well as cartoons accusing Israeli leftists of supporting Hamas.

One of the main revelations of the recent leaks is that the Arab community in Israel constitutes a target of the Russian influence campaign. For example, a fake Arabic-language article that was circulated online claimed that Israel did not have in its possession enough precision weapons, because it had given them to Ukraine. The article went on to claim that the lack of such weapons would lead to failures on the battlefield. “The good news should be heard by all believers living under occupation”, the article states. “The policy of the occupation government will soon lead to its defeat. We will wait for a spark to ignite our war of liberation, in which the entire Muslim world will support us”. The purpose of the article appears to be to prompt the Israeli-Arab population to turn against the Israeli government based on Israel’s alleged weakness, and to support Israel’s enemies. Read more of this post

US government wants to ban Chinese-made smart cars over espionage, sabotage fears

Chinese car industryTHE UNITED STATES DEPARTMENT of Commerce is proposing new regulations that seek to ban the sale of Chinese-made cars in the United States, over concerns that they could be used for espionage or sabotage. Several reports on the proposal noted that it was hurriedly introduced last week as a “national security action,” rather than a trade-related dispute between the US and China.

American government officials said that the new proposals come out of lengthy investigations into the software and technical specifications of Chinese cars. The investigations raised concern about “[c]ertain technologies originating from the [People’s Republic of China] or Russia” that are often found in Chinese-made cars. Such technologies include vehicle cameras, microphones, tracking devices, and several software packages that connect the cars to the world wide web.

Washington is concerned that these devices, and the software that runs them, could be used to collect the personal data of users, or to facilitate espionage activities on a large scale. Concerns have also been raised by US officials that Chinese-made smart cars could be remotely manipulated and used for sabotage during wartime. According to the US Department of Commerce, a central source could potentially “take control of all [the Chinese-made] vehicles operating in the US all at the same time, causing crashes, block[ed] roads, etc.”

When asked by reporters to justify the proposed regulations, Jake Sullivan, White House national security adviser, replied that the US had “already seen ample evidence of the [People’s Republic of China] pre-positioning malware on our critical infrastructure for the purpose of disruption and sabotage. And with potentially millions of vehicles on the road, each with 10- to 15-year lifespans, the risk of disruption and sabotage increases dramatically”.

Author: Ian Allen | Date: 23 September 2024 | Permalink

Spain and US reject claims they planned to assassinate Venezuelan officials

Nicolás MaduroTHE GOVERNMENTS OF SPAIN and the United States have strongly rejected allegations they were involved in an operation that aimed to kill leading Venezuelan officials, including the country’s President Nicolás Maduro. The allegations were made by a senior Venezuelan cabinet minister, following the arrests on Sunday of three Americans, as well as two Spanish and one Czech citizens. The six men have been charged with plotting to destabilize the Venezuelan government by killing Maduro and other top officials.

The allegations against the six foreign men were aired on live television by the Venezuelan Minister of the Interior Diosdado Cabello, who is a close ally of Maduro. Cabello accused the US Central Intelligence Agency (CIA) of “leading this operation” with the participation of special forces troops. The Venezuelan official went on to claim that at least one of the American citizens who were arrested over the weekend is a member of the US Navy Sea, Air, and Land (SEAL) Teams, commonly known as Navy SEALs.

Cabello referred to the six men as “mercenaries” with prior service in Colombia, Iraq, and Afghanistan. He added that they had been in contact with “French mercenaries in Eastern Europe” who had supplied them with “hundreds of weapons”. Cabello told reporters that Venezuelan authorities had seized over 400 rifles when they arrested the six men. The Venezuelan cabinet minister also claimed that the two Spanish citizens were employees of National Intelligence Center, Spain’s primary intelligence organization.

Late yesterday, however, Spanish officials issued strong denials of Cabello’s allegations. One Spanish government spokesperson told the Agence France Presse news agency that Madrid “denied and categorically rejected” Venezuela’s claims. Meanwhile, a statement issued by the US Department of State rejected as “categorically false […] any claims of US involvement in a plot to overthrow Maduro”. The French and Czech governments had yet to issue any official statements as of late last night.

Meanwhile, the BBC reported yesterday that the Spanish government has requested that Venezuelan authorities provide details of the detainees and that the Spanish embassy in Caracas is seeing to gain access to the two Spanish detainees.

Author: Joseph Fitsanakis | Date: 16 September 2024 | Permalink

Spy’s release by higher court shows Austria is unable to find its intelligence footing

Egisto OttON JUNE 26, THE longwinded case of Austria’s counter intelligence failure regarding a possible inside threat took yet another —quite surprising— turn: the state court of Vienna (Landesgericht Wien) released from pre-trial detention (Untersuchungshaft) Egisto Ott, a former member of the Federal Office for the Protection of the Constitution and Counterterrorism (BVT) —Austria’s now-dissolved domestic intelligence agency. Ott, who was accused of spying against Austria, had been arrested (again) at the end of March on suspicion of obtaining classified information for which he could provide no reason, as well as for presumably selling it. Among the suspected recipients of the classified information were Russian assets and —more or less directly— Russian intelligence.

However, the three-judge panel called to decide on the detention complaint came to the conclusion that, while there remains a strong suspicion (dringender Tatverdacht) against Ott, the reasons for his further detention were not sufficiently given. In the judges’ view, all activities that could carry a pre-trial detention were committed before Ott was arrested and released for the first time in 2021. Back then, Ott had also been released after a short detention, following a decision by the same court. Briefly summarized, in 2021 the Landesgericht concluded that Ott could no longer spy against Austria as he did not have access to classified information, having been removed from the domestic intelligence agency years earlier. Additionally, since the BVT was in the process of reorganization and reformation at that point, the judges deemed the possibility of further criminal behavior by Ott to be unrealistic.

The recent assessment that Ott did not conduct additional punishable offences following his first release is surprising, since the prosecutor alleged —with a certain undertone directed against the initial decision to release Ott, which can be noted in the arrest warrant— that Ott had resumed his information-gathering and handling activities immediately upon being set free in 2021. Specifically, Ott is accused of having unlawfully retrieved data from the Central Register of Residents (Zentrales Melderegister) on March 24 of that year and then passing it on. The information accessed by Ott concerned the Bulgarian investigative journalist Christo Grozev, who was living in Austria at the time. Consequently, Grozev had to leave Vienna, since his life was deemed to be in severe danger. Today, whenever Grozev returns to Austria to visit members of his family who remain there, he has to do so under heavy protection by the Austrian authorities.

Between June and November 2022, when Ott had been released from his first pre-trial detention, there was also an alleged transfer to Russia of three mobile phones, or their data, as well as a highly-encrypted SINA-workstation laptop. However, the judges of the Landesgericht concluded that, while information or intelligence provided to foreign services does not have to be secret to constitute criminal espionage against Austria, “concrete and vital interests of Austria” have to be violated by such a transfer. The judges did not deem that the evidence furnished by the prosecutor met their criteria. Die Presse, Austria’s ‘newspaper of record’, published a detailed explanation of the court decision. Read more of this post

Profile of Tang Yuanjun, alleged asset for Chinese intelligence 2018-2023

Yuanjun TangTANG YUANJUN WAS ARRESTED by the United States Federal Bureau of Investigation (FBI) in August 2024. He allegedly worked as a Chinese Ministry of State Security (MSS) asset between 2018 and 2023. He reported on the following categories of information that were of interest to the MSS:

  • Prominent U.S.-based Chinese democracy activists and dissidents.
  • US Chinese-American Member of Congress Xiong Yan, from New York.
  • Immigration claims from dissidents wanting to leave China for the US.

According to the US Department of Justice (DoJ), Tang expressed his desire to see his aging family in China. A prominent dissident such as Tang would not be able to travel to China without being arrested, unless his travel had been approved by authorities. An acquaintance helped him establish secure online contact with the MSS. After being recruited, Tang reported to the MSS using an email account, encrypted chats, text messages and audio and video calls. Tang helped the MSS infiltrate a group chat on WhatsApp; used by numerous People’s Republic of China (PRC) dissidents and pro-democracy activists to communicate about pro-democracy issues and express criticism of the PRC government. In fact, this was what users called a “super group”. It is a group that consists of many other groups. Members could not even identify who was the sponsor of the group chats [1].

In addition, Tang reportedly video-recorded a June 2020 Zoom discussion commemorating the anniversary of the Tiananmen Square massacre in the PRC. The Zoom online discussion was led by Zhou Fengsuo, Director of the June 4th Memorial Museum in New York City and a leading advocate for democracy in China. The Ministry of Public Security also infiltrated these discussions with the assistance of Zoom China and US based employees [2].

Tang was Secretary General of the overseas headquarters of the China Democratic Party United Headquarters in New York City. This non-profit organization assists mainland Chinese dissidents in immigration and asylum applications for the US. Tang allegedly provided information on these individuals to the MSS [3]. Tang also allegedly identified ten immigration attorneys to support MSS efforts to place assets in the US. Other dissident organizations in New York and Los Angeles provide similar visa application services to generate income.

In 2022, reportedly Tang met with the MSS in Changchun City, Jilin Province, China, where an officer installed a software on Tang’s phone which Tang believed to be a “bug” that caused all photographs and videos captured on the phone to be transmitted to the MSS. In his role as leading democracy advocate Tang encouraged dissidents to attend protests in Manhattan and Washington DC. He used the compromised phone to take photographs of the events. The Chinese Communist Party (CCP) then used the photographs as evidence against overseas dissidents. Read more of this post