Germany convicts married couple of spying for Indian intelligence service

Manmohan S. Kanwal Jit K.A court in Frankfurt has found a married couple guilty of spying in Germany on behalf of India’s external intelligence service. Due to Germany’s strict privacy laws, the couple have been identified only as 50-year-old Manmohan S. and his wife, Kanwal Jit K., who is 51.

According to the prosecution, Manmohan S. was recruited by India’s Research and Analysis Wing (RAW) in January of 2015. His wife joined his intelligence-collection activities in July 2017. Following their arrest, the couple told German authorities that they held regular meetings with a RAW case officer who was serving as a diplomat in the Indian consulate in Frankfurt. They also said they were paid nearly $8,000 for their services.

The two convicted spies said at their trial that they were tasked to spy on adherents of the Sikh religion and members of the Kashmiri expatriate community in Germany. The central European country is believed to host as many as 20,000 Indian Sikhs, many of whom openly proclaim secessionist aspirations. Many Sikhs in India and abroad campaign for the creation of a Sikh state in parts of northwestern India and Pakistan, which they call Khalistan. India is also concerned about the secessionist aspirations of Kashmiris, a predominantly Muslim population of 10 million that lives in the region of Jammu and Kashmir. Delhi has long claimed that expatriate groups living in Europe and the United States provide funding for secessionist groups that operate in the region.

On Thursday, Frankfurt’s Higher Regional Court found the couple guilty of conducting illegal espionage activities on German soil. It handed Manmohan S. a one-and-a-half-year suspended jail sentence, while Kanwal Jit K. was given a fine that equates to 180 days of income.

Author: Joseph Fitsanakis | Date: 13 December 2019 | Permalink

Belgian university shuts down Chinese-funded institute due to espionage claims

Xinning SongOne of Belgium’s leading universities has decided to shut down a research institute funded by the Chinese government, after the Belgian intelligence service accused its director of spying on behalf of Beijing. The news was announced on Wednesday by the Vrije Universiteit Brussel (VUB), one of Belgium’s leading higher-education institutions. The Confucius Institute has been operated at VUB since 2006. But the university’s board of directors now says that it will not be renewing its contact with the Institute in 2020.

The Confucius Institute at VUB is one of more than 500 such research bodies that the government of China has funded around the world since 2004. Their mission is to promote the language and culture of China to the world. However, numerous academic institutions in Japan, Canada, and a number of European countries, have recently shut down Confucius Institute branches, following allegations that their staff members carried out espionage tasks, or tried to stifle academic research critical of China. In Europe alone, the University of Lyon in France, Stockholm University in Sweden, and Holland’s University of Leiden have all recently terminated their cooperation with the Confucius Institute.

In October of this year, Belgium’s State Security Service (VSSE) concluded that the VUB Confucius Institute director, Dr. Song Xinning, carried out espionage tasks on behalf of the Chinese government. As a result, the Belgian government refused to renew the work visa of Dr. Song, who had lived in Belgium for over a decade. Additionally, the Chinese academic was barred from entering the European Union’s Schengen Area —which comprises 26 European countries— for eight years.

Dr. Song alleges that his work visa was revoked after he refused to cooperate with an American diplomat stationed in Brussels. He also denies that he was ever in the service of Chinese intelligence or the Chinese state. But the VUB appears to have sided with the Belgian government in this dispute. The university annulled its contract with Dr. Song and, as of January, will be terminating its relationship with the Confucius Institute. In a press statement published online, VUB Rector Caroline Pauwels said that the work of the Confucius Institute did not meet the “current policy objectives” of the university.

Author: Ian Allen | Date: 12 December 2019 | Permalink

Turkey offers to send troops to Libya as tensions rise with Greece, Egypt

Turkey LibyaTurkish President Recep Tayyip Erdoğan has said his country is prepared to deploy troops to Libya, just days after Ankara surprised analysts by announcing an agreement with the embattled Libyan government in Tripoli. The Turkish-Libyan agreement has spurred angry reactions from Israel, Greece and Egypt, all of which are competing with Turkey for control of newly discovered gas fields in the eastern Mediterranean seabed.

The Turkish-Libyan agreement merges the two countries’ Exclusive Economic Zones (EEZ) and ostensibly prevents other players in the area, including Greece, Egypt, Israel and Cyprus, from drilling for natural gas without the consent of Ankara and Tripoli. However, according to Greece, the agreement disregards the presence of several Greek islands —including the largest one, Crete— in the Turkish-Libyan EEZ. Athens says that it views the Turkish-Libyan agreement as a direct claim against its territory. Last week the Greek government summarily expelled the Libyan ambassador from the country, marking a dramatic deterioration in the historically close relationship between Athens and Tripoli.

To further-complicate matters, several European countries, as well as Russia and the United States, do not support the Tripoli-based Government of National Accord (GNA), with which Turkey has signed its agreement. Instead, they support the Libyan National Army (LNA), which is commanded by Field Marshal Khalifa Haftar, an old adversary of the Libyan leader Muammar al-Gaddafi. Haftar lived in the United States under Washington’s protection for several decades before returning to Libya in 2011. The LNA, which is based in eastern Libya, is also supported by Saudi Arabia, the United Arab Emirates, and other American allies in the Persian Gulf.

It follows that, if Turkey deploys troops to Libya, it may be entering a collision course with several of its North Atlantic Treaty Organization (NATO) allies. Ankara’s move will also be confronted by Russia, which is purported to have troops in eastern Libya. On Tuesday, however, Turkish President Erdoğan seemed determined to proceed with his plan. In a speech at a university in Ankara, the Turkish leader proclaimed that, “if Libya were to make a request, we would send a sufficient number of troops”, adding that “there is no hurdle” to doing so “after the signing of the security agreement” between Ankara and Tripoli.

This is the first time that Turkey has secured an agreement with a regional ally in the matter of energy exploration rights. Previously, Greece, Israel, Egypt and Cyprus struck a deal to coordinate their gas exploration activities, and eventually supply Europe with Israeli and Cypriot natural gas via a projected gas pipeline that would pass through Greece. But the Turkish move raises doubts about the prospects of such a project, with some analysts even speculating whether centuries-old rivals Greece and Turkey may be getting closer to war.

In a speech on Monday, Greek President Prokopis Pavlopoulos warned Ankara that “Greece will defend its borders [and] territory”. Meanwhile European Union leaders met on Monday behind closed doors to discuss the imposition of sanctions on Turkey as punishment for disputing the maritime territorial boundaries of Cyprus, a European Union member.

Author: Joseph Fitsanakis | Date: 11 December 2019 | Permalink

Victor Sheymov, among Cold War’s most important KGB defectors, dies at 73

Victor SheymovVictor Ivanovich Sheymov, who is often referred to as one of the most important intelligence defectors of the Cold War, has reportedly died in the American state of Virginia. He was one of the most senior officials in the Soviet Union’s Committee for State Security (KGB) to ever defect to the West, and revealed important KGB secrets to the United States.

Sheymov was born in 1946 to a family of elite Soviet scientists. His father was an engineer and his mother a doctor specializing in cardiology. A gifted mathematician and student-athlete, Sheymov was recruited into the KGB almost as soon as he graduated from the elite Bauman Moscow State Technical University, where he majored in engineering. By his early 30s, Sheymov had risen to the rank of major under the KGB’s Eighth Chief Directorate, which handled secret communications systems. He oversaw a large unit that monitored the flow of information between the KGB’s headquarters and the agency’s operatives around the world. In later years, Sheymov was assigned code-breaking and counter-espionage tasks, and oversaw the preparation of daily classified briefings for the Politburo —the Communist Party’s highest policy-making body.

But in the 1970s Sheymov grew disillusioned with Soviet politics, and began to feel slighted by the infighting and incompetence inside the KGB. While visiting Poland on KGB business, he volunteered his services to the Central Intelligence Agency (CIA) by walking into the US embassy in Warsaw. The CIA eventually gave him the cryptonym CKUTOPIA and, after verifying his senior status inside the KGB, exfiltrated him to the United States along with his wife and 5-year-old daughter. His was the first known instance of a successful CIA exfiltration of a defector from Soviet territory.

After spending several months being debriefed and polygraphed at a CIA safe house, Sheymov and his family were given new identities and US citizenship. But the defector decided to emerge from hiding in 1990, as the USSR was dissolving. In his book about his espionage work and defection, titled Tower of Secrets, Sheymov said he informed the CIA about the KGB’s unsuccessful plots to assassinate Pope John Paul II and about the successful operation to assassinate Afghan President Hafizullah Amin in 1979. His insights were also instrumental in the decision of the US State Department to demolish the US embassy in Moscow, due to fears about the presence of listening devices planted inside the building’s walls by Soviet builders. The building was eventually replaced with another structure built by vetted American workers.

Sheymov was awarded the US Intelligence Medal and lived the rest of his life in America, where he headed a computer security company. He died on October 18 in Vienna, Virginia, but his death was not publicly reported until this week. Sheymov’s wife told reporters that he died from health complications arising from chronic pulmonary disease.

Author: Joseph Fitsanakis | Date: 10 December 2019 | Permalink

Unprecedented trial of ‘secret prisoner’ in Australia raises legal questions

Alexander Maconochie CentreAn unprecedented closed-door trial of a man identified only as “Witness J”, who was convicted earlier this year of a crime that cannot be revealed, has raised questions about the relationship between security and the law in Australia. The man, who is also known as “Prisoner 123458”, was sentenced to a jail sentence in February of this year. His sentencing came following a closed-door hearing, which was described by a judge as “generally undesirable” and “unusual”.

Witness J is believed to be in his mid-30s and to have served as an intelligence officer in the Australian military, with a Top Secret security clearance. According to ABC News, he served in Iraq, Afghanistan, and East Timor and had a distinguished service record. But he drew the attention of counterintelligence investigators in 2018, while undergoing a five-year re-evaluation of his security clearance status. During that time he was reportedly serving as a civilian in an undisclosed country in Southeast Asia.

ABC News said that “some anomalies in [Witness J’s] answers” —presumably while he was undergoing a polygraph test— raised further questions about whether “he could be compromised”. This, according to ABC News, coincided with the deterioration of his mental health, which led him to seek “internal help” from his employer on several occasions. Reportedly, his Top-Secret clearance status did not allow him to seek outside professional advice about his condition. Witness J was eventually jailed in mid-May 2018 and spent a month in solitary confinement. He was then placed in a high-security wing for serious sex offenders at the Alexander Maconochie Centre prison in Canberra. This was not because he was a sex offender, but because it was determined that he would be safer there than in the other wings of the prison.

In February of this year, Witness J was sentenced in a closed-door trial, held under the secrecy provisions of Australia’s 2004 National Security Act. Australia’s Attorney General, Christian Porter, told ABC that the information shared in Witness J’s hearing was “of a kind that could endanger the lives or safety of others”. The only reason why records of Witness J’s incarceration have appeared on the public record was because officers of the Australian Federal Police obtained a warrant to search his prison cell in order to confiscate a personal memoir that they allege the prisoner composed about his case during his incarceration.

It is believed that Witness J was released from prison in August of this year, 16 months before completing his sentence. He is not able to speak to the press, or identify himself in public in connection with this case. According to ABC News, he is only allowed to refer to his conviction as having been for “mishandling classified information”. Several experts have commented on the secret trial of Witness J One expert, Bret Walker, a barrister and former independent national security legislation monitor, told “ABC News that the case of Witness J was “a perfectly well-intentioned piece of national security legislation might not be operating in the way one would like”.

Author: Ian Allen | Date: 09 December 2019 | Permalink

Estonian court to release defense official who spied for Russia for 13 years

Herman SimmA court in Estonia has ordered the release of a former senior defense official who spied on the North Atlantic Treaty Organization for Russia, causing what experts described at the time as “the most serious case of espionage against NATO since the end of the Cold War”. Herman Simm was a high-level official at the Estonian Ministry of Defense, who once led the country’s National Security Authority. This meant that he was in charge of Estonia’s national cyber defense systems and supervised the issuing of security clearances.

He was arrested in 2008 along with his wife and charged with spying for Russia for over a decade. At the time of his arrest Simm was responsible for handling all of Estonia’s classified and top secret material regarding NATO. This prompted European and American security officials to describe Simm as the most damaging spy against NATO since the collapse of the Soviet Union in 1991. In February of 2009 Simm was sentenced to 12½ years in prison.

On Thursday, a county court in Estonia’s southeastern city of Tartu ruled that Simm is eligible for parole, because he has served the majority of his prison sentence without committing any disciplinary infractions. Officials from the Tartu County Prison and the prosecutor’s office agreed that early release would provide Simm with an incentive to abide with Estonian law. The court also stated in its decision that Simm had no more access to classified information and that he was of no further interest to foreign countries and intelligence organizations.

Simm is expected to be released within days, and will remain under probation until March of 2021. The court’s decision can be appealed by December 20.

Author: Ian Allen | Date: 06 December 2019 | Permalink

Elite Russian spy unit used French Alps region as logistical base

Chamonix FranceAn elite group Russian military intelligence officers, who have participated in assassinations across Europe, have been using resorts in the French Alps as logistical and supply bases, according to a new report. The report concerns Unit 29155 of the Main Directorate of the General Staff of the Russian Armed Forces, commonly known as GRU. According to The New York Times, which revealed its existence of 29155 in October, the unit has been operating for at least 10 years. However, Western intelligence agencies only began to focus on it in 2016, after it was alleged that an elite group of Russian spies tried to stage a coup in the tiny Balkan country of Montenegro.

Unit 29155 is believed to consist of a tightly knit group of intelligence officers led by Major General Andrei V. Averyanov, a hardened veteran of Russia’s Chechen wars. The existence of the unit is reportedly so secret that even other GRU operatives are unlikely to have heard of it. Members of the unit frequently travel to Europe to carry out sabotage and disinformation campaigns, kill targets, or conduct other forms of what some experts describe as the Kremlin’s hybrid war. They are believed to be responsible for the attempt on the life of Sergei Skripal, a former GRU intelligence officer who defected to Britain. He almost died in March 2018, when two Russian members of Unit 29155 poisoned him in the English town of Salisbury.

On Wednesday, a new report in the French newspaper Le Monde claimed that Unit 29155 used the French Alps as a “rear base” to carry out operations throughout Europe. According to the paper, the information about the unit’s activities in France emerged following forensic investigations of the activities of its members by British, Swiss, French and American intelligence agencies. In the same article, Le Monde published the names of 15 members of Unit 29155, which allegedly stayed in various French alpine towns and cities between 2014 and 2018. The paper said that they traveled to France from various countries in Europe, such as Spain, the United Kingdom, Switzerland, or directly from Russia.

The alleged Russian spies stayed in France’s Haute-Savoie, which borders Switzerland, and is among Europe’s most popular wintertime tourist destinations. The area includes the world-famous Mont Blanc mountain range and the picturesque alpine towns of Annemasse, Evian and Chamonix. Several members of the unit visited the region repeatedly, said Le Monde, while others entered France once or twice, in connection with specific spy missions. It is believed that the reasoning behind their trips to the French Alps was to blend in with the large numbers of international tourists that travel to the region throughout the year. However, the unit also utilized several other areas in Eastern Europe as rear bases, including cities and towns in Moldova, Montenegro and Bulgaria, said Le Monde.

Author: Joseph Fitsanakis | Date: 05 December 2019 | Permalink

Switzerland claims embassy worker was abducted by Sri Lankan security officers

Swiss embassy Sri LankaSwitzerland has filed a formal complaint after an employee of the Swiss embassy in Sri Lanka was allegedly abducted by men who forced her to divulge sensitive information about the embassy and its activities. The Swiss Ministry of Foreign Affairs said on Tuesday that the embassy employee was kidnapped by four men while walking in the Sri Lankan capital Colombo, on November 25. The men took her to what appeared to be a safe house and interrogated her for several hours.

The men eventually forced the Swiss embassy employee, who is a Sri Lankan national, to unlock her personal cell phone. According to Swiss government officials, they appeared to be looking for information about a senior Sri Lankan police detective who recently fled to Switzerland with his family and was granted political asylum. Some Sri Lankan media identified the man as Nishantha Silva, a police detective who until recently headed the Sri Lankan Criminal Intelligence Division’s Organized Crime Investigation Unit.

Silva is one of hundreds of members of Sri Lanka’s public sector who have fled abroad following the election of President Gotabaya Rajapaksa last month. The Rajapaksa family is one of the most powerful in the country, and has a long history of influencing Sri Lankan politics. Hours after assuming power, the ultra-nationalist Rajapaksa pledged to “hunt down” the leadership of the police and security services who investigated his family after 2015, when the Rajapaksas were ousted from the government. Hundreds of police and security officers have since been arrested or summarily fired.

On Tuesday, a Swiss Foreign Ministry spokesman told The New York Times that the Swiss government had verified the details of the abduction of its embassy worker. The spokesman added that the employee was forced to disclose “embassy-related information” after she was “threatened at length” by the men. The latter released her after warning her that she would be killed if she spoke to anyone about her ordeal.

On Monday, a spokesman for President Rajapaksa told reporters in Colombo that the Sri Lankan government questioned the accuracy of the Swiss embassy worker’s account of her abduction. Later, however, the Sri Lankan government announced that it had launched an investigation into the allegations. It now appears that the Sri Lankan government is preventing the embassy worker from leaving the country while the investigation into her claims is underway.

Author: Joseph Fitsanakis | Date: 04 December 2019 | Permalink

FBI examining FaceApp over potential counterintelligence concerns

FBIThe United States Federal Bureau of Investigation says it is examining possible counterintelligence threats in connection with the popular online application FaceApp, which is headquartered in Russia. The application first made its appearance in January of 2017 and quickly became popular among smartphone users around the world. It allows users to upload a photograph of their face and then edit it with the help of artificial-intelligence software. The software can change the user’s photograph to make it look younger or older, or make it look as if it is from the opposite gender. The result can be impressively realistic and life-like.

The St. Petersburgh-based company behind FaceApp, Wireless Lab, claims that the photos of users are uploaded to cloud servers situated in New Zealand, Australia and Singapore. They are then deleted within two days from the moment they are uploaded by users, without ever being transferred to servers located in the territory of Russia. But the FBI does not seem to believe these assurances. In a letter sent late last month to the Minority Leader of the US Senate, Charles Schumer (D-NY), the Bureau said it was examining FaceApp as part of its counterintelligence mission.

In the letter, which was published on Monday, Jill Tyson, Assistant Director of the FBI’s Office of Congressional Affairs, said the fact that Wireless Lab is based in Russia raised a number of counterintelligence concerns. These relate to the types of data Wireless Lab collects on its customers and the privacy policies that apply to Russian Internet companies. According to Tyson, the Russian Federal Security Service (FSB) has the right to “remotely access all communications and servers on Russian networks without making a request” to network providers. He added that, if the FBI found that FaceApp was involved in activities meant to interfere with upcoming elections in the United States, the Bureau would investigate the matter further, and possibly involve the Foreign Influence Task Force, an FBI-led body that was established after the 2016 US presidential elections.

The FBI’s letter was written in response to an earlier letter sent to the Bureau by Senator Schumer in July, which expressed concerns about potential threats posed by FaceApp to the privacy of American Internet users and to the nations’ security as a whole.

Author: Joseph Fitsanakis | Date: 03 December 2019 | Permalink

Airbus fires employees for accessing classified German military documents

AirbusThe European multinational aerospace corporation Airbus has fired 16 of its employees for illegally possessing classified documents belonging to the German military. The Netherlands-registered aviation company, one of the world’s largest, has been cooperating with an investigation into the incident. The probe has been led by German authorities since September of 2018.

The incident, which German authorities have termed as industrial espionage, concerns two Airbus cybersecurity projects for weapons systems used by the German military. The projects are led by Airbus scientists at the company’s Communications, Intelligence and Security (CIS) program line, which is based in the German city of Munich. In September of last year, German media reported that a number of Airbus employees at the CIS facility had been found to possess classified files belonging to the German military, which they should not have been able to access.

An Airbus official said at the time that the classified documents related “to two future German [military] procurement projects”, and that the company had “self-reported […] potential wrongdoings by several employees […] to German authorities”. The official added that “[s]ome of our employees had documents that they shouldn’t have had”. It later emerged that the documents related to plans by the German Armed Forces to acquire a communication system from one of Airbus’ rival companies.

Following the September 2018 announcement, Airbus said that it had suspended 20 of its employees while it conducted an “ongoing internal review with the support of an external law firm”. At the same time it said that it was “fully cooperating with relevant authorities [in Germany] to resolve the matter”. It was also reported at the time that the German military had taken disciplinary action against one of its employees, but no further information was disclosed.

It has now emerged that Airbus has fired 16 of its CIS employees who were suspended last year. The news was first announced on Sunday by Deutsche Presse-Agentur (DPA), Germany’s largest news agency. Airbus subsequently confirmed the DPA’s report, but provided no further details about the case. It is not currently known whether the case has been closed.

Author: Joseph Fitsanakis | Date: 02 December 2019 | Permalink

Extradition fight over Russian man held in Greece may point to spies’ use of bitcoin

Aleksandr VinnikAn intense fight between the United States and Russia over the extradition of a Russian cryptocurrency tycoon being held in Greece, is raising questions about the possible use of cryptocurrencies by spies. The tycoon in question is Aleksandr Vinnik, 39, who in 2011 co-founded BTC-e, an international cryptocurrency-trading platform. BTC-e allowed users to buy or sell several popular cryptocurrencies, including bitcoin and litecoin, using Russian rubles, United States dollars, or European Union euro currencies. Although headquartered in Russia, BTC-e’s servers were located in Bulgaria, while its operations were conducted through its offshore components in Cyprus and the Seychelles.

By 2015, BTC-e was reportedly facilitating just over 3 percent of the worldwide daily volume of cryptocurrency trading. But, according to some sources, the company was also facilitating up to 70 percent of worldwide criminal activity involving cryptocurrencies. Washington alleges that the company was built on a model that relied heavily on the activities of criminal entities, as the latter sought the ability to conduct online monetary transactions without being tracked by governments.

In 2017, American authorities seized BTC-e’s website —a move that terminated the company’s operations. Washington also prompted authorities in Greece to arrest Vinnik, while he was vacationing at a Greek resort with his family. The Russian co-founder of BTC-e is today in a Greek prison, awaiting a decision by the Greek authorities to extradite him to the United States. If this happens, he will be tried on 21 counts of international money laundering and a host of other criminal charges.

Interestingly, however, shortly after Vinnik’s arrest, the Russian government filed a court order to have Greece extradite him to Russia, where he is reportedly wanted for relatively minor fraud-related charges. What is more, the Greek government was directly lobbied by no other than the Russian President Vladimir Putin —an unusually high-level approach, when one considers Vinnik’s trivial charges in Russia. France has also sought to have Vinnik extradited there, instead of the United States.

What lies behind these moves? There are many who believe that American authorities moved against BTC-e after realizing that Russian spies used the company to hide their traces while trying to meddle with the 2016 presidential elections in the United States. A recent report by the State Department’s RFE/RL news website claims that a number of London-based observers from groups such as Global Witness and Elliptic Enterprises believe there are strong links between Russian spy agencies and BTC-e. American authorities have managed to access information about the inner workings of BTC-e’s website. They are probably viewing Vinnik as an intelligence asset, who can potentially shed light on the company’s alleged role as a money laundering mechanism for Russian spies —and probably others as well.

Author: Joseph Fitsanakis | Date: 29 November 2019 | Permalink

As Australia launches probe, skeptics cast doubts on Chinese defector’s spy claims

Wang LiqiangAs the Australian government has launched an official investigation into the claims made by a self-styled Chinese intelligence defector, some skeptics have begun to cast doubts about his revelations. The claims of Wang “William” Liqiang have dominated news headlines in Australia for over a week. The 26-year-old from China’s eastern Fujian province reportedly defected to Australia in October, while visiting his wife and newborn son in Sydney. He is currently reported to be in a safe house belonging to the Australian Security Intelligence Organization (ASIO).

The Australian spy agency confirmed last week that Mr. Wang had provided a 17-page sworn statement, in which he detailed his work as an undercover intelligence officer for Chinese military intelligence. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they plan to carry out espionage operations on behalf of Bejing. Some media reports claimed that Mr. Wang had shared details about deep-cover Chinese intelligence networks in Australia. The Australian government said on Tuesday that an official investigation had been launched into Mr. Wang’s claims.

But some skeptics in Australia and elsewhere have begun to raise doubts about the Chinese defector’s claims, suggesting that he has given little —if any information— that is genuinely new. Some argue that Mr. Wang is much too young to have been entrusted with senior-level responsibilities in the intelligence agency of a country that rarely promotes twenty-somethings in high-ranking positions. Additionally, Mr. Wang appears to have no military background —he claims to have been recruited while studying fine art— which is not typical of a Chinese military intelligence operative.

Furthermore, Mr. Wang episode interviewers from Australian television’s 60 Minutes program that he began feeling tormented by moral dilemmas when his staff officers supplied him with a fake passport bearing a different name, in preparation for an operation in Taiwan. However, by his own admission, Mr. Wang had been supplied with fake passports for previous operations, so it is not clear why he lost his nerve at the time he did. In fact, case officers usually covet the opportunity to go undercover and feel a sense of exhilaration when they receive fake identification documents for an undercover mission.

Is Mr. Wang not sharing the entire background to his decision to defect to Australia? Or could he be deliberately amplifying his role in Chinese intelligence, in an effort to appear useful to the Australian government and thus secure political protection by Canberra? In the words of Alex Joske, an analyst at the  International Cyber Policy Centre of the Australian Strategic Policy Institute, the details in some of Mr. Wang’s claims mean that “government investigations should uncover the facts eventually. But we don’t know the full story and we probably never will”.

Author: Joseph Fitsanakis | Date: 26 September 2019 | Permalink

Europol culls thousands of Islamic State online accounts in ‘day of action’

Telegram AppThe law enforcement agency of the European Union, in cooperation with the popular online messaging service Telegram, has culled thousands of Islamic State online accounts in what it described as “a day of action”. The operation was coordinated by the European Union Agency for Law Enforcement Cooperation, better known as Europol. The agency coordinated its activities with the popular instant-messaging service Telegram, which the Islamic State has used as its main platform of mass communication since 2014.

In a press release that appeared on its website on Friday, Europol said that it had managed to locate “a significant portion of key actors within the Islamic State network on Telegram” and “push [them] away from the platform”. The messaging app confirmed the joint “day of action” with Europol and said it took down over 5,000 “terrorist accounts and bots” from its network on November 22 and 23. The company said this was nearly 10 times higher than the usual number of user accounts taken down daily for violating its user agreement.

The BBC said that the removal of the accounts appeared to affect heavily the activities of the Nashir News Agency, an Islamic State propaganda outlet that uses the Telegram app to publicize press releases from the Islamic State. Dozens of online channels and community groups that were moderated by Nashir News Agency editors were also impacted, as their moderators had disappeared from the network. On Saturday, some Telegram users began posting information about replacement accounts for Nashir News Agency press releases, but these too were taken down within hours.

This was the second major “day of action” against online terrorist propaganda that Europol coordinated, with the first one being in April of last year. But critics argue that such efforts are unlikely to have a long-term impact on the ability of terrorist groups to spread online propaganda, unless they are constant and systematic. Meanwhile, Islamic State sympathizers criticized the Telegram service on other social media platforms and warned that moves to silence the group would result in its membership going deeper underground.

Author: Joseph Fitsanakis | Date: 26 September 2019 | Permalink

Chinese defector reveals identities of Chinese undercover spies in Asia and Australia

Wang LiqiangA Chinese intelligence defector has reportedly given the Australian government information about entire networks of Chinese undercover spies in Hong Kong, Taiwan and Australia, according to reports. The story of Wang “William” Liqiang, made headlines all over Australia during the weekend, culminating in an entire episode of 60 Minutes Australia about him airing on Sunday. The 26-year-old from China’s eastern Fujian province reportedly defected to Australia in October, while visiting his wife and newborn son, who live in Sydney. He is currently reported to be in a safe house belonging to the Australian Security Intelligence Organization (ASIO).

Police in the Chinese city of Shanghai claim that Mr. Wang is a small-time criminal who has been found guilty of using fraudulent documents and has a 15-month suspended prison sentence on his record. In a statement issued on Sunday, China’s embassy in Canberra described Mr. Wang as a “convicted fraudster” who was “wanted by police after fleeing [China] on a fake passport”. But according to reports in the Australian media, Mr. Wang has provided the ASIO with a 17-page sworn statement, in which he details his work as an undercover intelligence officer. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they organize and implement espionage operations on behalf of Bejing.

In a leading article published on Saturday, The Sydney Morning Herald referred to Mr. Wang as “the first Chinese operative to ever blow his cover” and claimed that he had given the ASIO “a trove of unprecedented inside intelligence” about Chinese espionage operations in Southeast Asia. The newspaper said that the defector had revealed details about entire networks of Chinese intelligence operatives in Taiwan and Hong Kong. He also reportedly provided identifying information about deep-cover Chinese intelligence networks in Australia.

Meanwhile, in an unrelated development, Australian media said yesterday that the ASIO was examining allegations that a Chinese espionage ring tried to recruit an Australian businessman of Chinese background and convince him to run for parliament. According to reports, the spy ring approached Nick Zhao, a successful luxury car dealer, and offered to fund his political campaign with nearly $700,000 (AUS$1 million) if he run as a candidate for the Liberal Party of Australia. Zhao reportedly told the ASIO about the incident last year, shortly before he was found dead in a Melbourne hotel room. His death remains under investigation.

Author: Joseph Fitsanakis | Date: 25 November 2019 | Permalink

South Korea rejects US pressure to maintain intelligence agreement with Japan

South Korea JapanSouth Korea appears determined to reject calls from the United States to maintain an intelligence-sharing agreement with Japan, as relations between Seoul, Tokyo and Washington continue to experience tensions. The South Korean government has been issuing warnings since August that it will not renew the General Security of Military Information Agreement (GSOMIA), which is scheduled to lapse on Saturday. The agreement dates to 2016; it facilitates the sharing of intelligence between South Korea and Japan about North Korea’s missile and nuclear programs.

The agreement has fallen victim to an escalating tit-for-tat row between the two Asian countries, which is rooted in the use of forced Korean labor by Japan in World War II. South Korea is demanding financial compensation for the use of slave labor, including sex slaves, by Japanese occupation troops during Korea’s annexation by Japan from 1910 until 1945. In July, Tokyo responded to a mass boycott of Japanese goods by South Korean consumers by limiting the export of electronics to be used in South Korea’s ship-building industry. It also removed South Korea from the list of countries with the ability to fast-track their exports to Japan. South Korea responded last summer by threatening to effectively abandon GSOMIA.

Since that time, Washington has been pressuring Seoul to remain in the treaty. The United States is widely seen as the architect of GSOMIA, as it worked closely with Japan and South Korea for over 6 years to convince them to agree to exchange intelligence, despite their deep-rooted mutual animosity. The White House has traditionally viewed GSOMIA as a significant parameter in security cooperation between its allies in the Far East. Back in August, American officials warned that terminating GSOMIA would threaten its ability to monitor North Korean nuclear activity.

But Seoul is not willing to back down. On Thursday, the country’s Minister of Foreign Affairs, Kang Kyung-wha, said that unless there was “a change in Japan’s attitude, our position is we won’t reconsider”. Kang Gi-jung, Political Affairs Secretary to South Korean President Moon Jae-in, added that Seoul would “not wave a white flag”. Japan’s Minister of Defense, Taro Kono, urged South Korea to “make a sensible decision” and warned that Seoul, not Tokyo, would be the biggest victim of the termination of GSOMIA. Most observers expect that GSOMIA will simply expire come Saturday.

Author: Joseph Fitsanakis | Date: 22 November 2019 | Permalink