Extradition fight over Russian man held in Greece may point to spies’ use of bitcoin

Aleksandr VinnikAn intense fight between the United States and Russia over the extradition of a Russian cryptocurrency tycoon being held in Greece, is raising questions about the possible use of cryptocurrencies by spies. The tycoon in question is Aleksandr Vinnik, 39, who in 2011 co-founded BTC-e, an international cryptocurrency-trading platform. BTC-e allowed users to buy or sell several popular cryptocurrencies, including bitcoin and litecoin, using Russian rubles, United States dollars, or European Union euro currencies. Although headquartered in Russia, BTC-e’s servers were located in Bulgaria, while its operations were conducted through its offshore components in Cyprus and the Seychelles.

By 2015, BTC-e was reportedly facilitating just over 3 percent of the worldwide daily volume of cryptocurrency trading. But, according to some sources, the company was also facilitating up to 70 percent of worldwide criminal activity involving cryptocurrencies. Washington alleges that the company was built on a model that relied heavily on the activities of criminal entities, as the latter sought the ability to conduct online monetary transactions without being tracked by governments.

In 2017, American authorities seized BTC-e’s website —a move that terminated the company’s operations. Washington also prompted authorities in Greece to arrest Vinnik, while he was vacationing at a Greek resort with his family. The Russian co-founder of BTC-e is today in a Greek prison, awaiting a decision by the Greek authorities to extradite him to the United States. If this happens, he will be tried on 21 counts of international money laundering and a host of other criminal charges.

Interestingly, however, shortly after Vinnik’s arrest, the Russian government filed a court order to have Greece extradite him to Russia, where he is reportedly wanted for relatively minor fraud-related charges. What is more, the Greek government was directly lobbied by no other than the Russian President Vladimir Putin —an unusually high-level approach, when one considers Vinnik’s trivial charges in Russia. France has also sought to have Vinnik extradited there, instead of the United States.

What lies behind these moves? There are many who believe that American authorities moved against BTC-e after realizing that Russian spies used the company to hide their traces while trying to meddle with the 2016 presidential elections in the United States. A recent report by the State Department’s RFE/RL news website claims that a number of London-based observers from groups such as Global Witness and Elliptic Enterprises believe there are strong links between Russian spy agencies and BTC-e. American authorities have managed to access information about the inner workings of BTC-e’s website. They are probably viewing Vinnik as an intelligence asset, who can potentially shed light on the company’s alleged role as a money laundering mechanism for Russian spies —and probably others as well.

Author: Joseph Fitsanakis | Date: 29 November 2019 | Permalink

As Australia launches probe, skeptics cast doubts on Chinese defector’s spy claims

Wang LiqiangAs the Australian government has launched an official investigation into the claims made by a self-styled Chinese intelligence defector, some skeptics have begun to cast doubts about his revelations. The claims of Wang “William” Liqiang have dominated news headlines in Australia for over a week. The 26-year-old from China’s eastern Fujian province reportedly defected to Australia in October, while visiting his wife and newborn son in Sydney. He is currently reported to be in a safe house belonging to the Australian Security Intelligence Organization (ASIO).

The Australian spy agency confirmed last week that Mr. Wang had provided a 17-page sworn statement, in which he detailed his work as an undercover intelligence officer for Chinese military intelligence. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they plan to carry out espionage operations on behalf of Bejing. Some media reports claimed that Mr. Wang had shared details about deep-cover Chinese intelligence networks in Australia. The Australian government said on Tuesday that an official investigation had been launched into Mr. Wang’s claims.

But some skeptics in Australia and elsewhere have begun to raise doubts about the Chinese defector’s claims, suggesting that he has given little —if any information— that is genuinely new. Some argue that Mr. Wang is much too young to have been entrusted with senior-level responsibilities in the intelligence agency of a country that rarely promotes twenty-somethings in high-ranking positions. Additionally, Mr. Wang appears to have no military background —he claims to have been recruited while studying fine art— which is not typical of a Chinese military intelligence operative.

Furthermore, Mr. Wang episode interviewers from Australian television’s 60 Minutes program that he began feeling tormented by moral dilemmas when his staff officers supplied him with a fake passport bearing a different name, in preparation for an operation in Taiwan. However, by his own admission, Mr. Wang had been supplied with fake passports for previous operations, so it is not clear why he lost his nerve at the time he did. In fact, case officers usually covet the opportunity to go undercover and feel a sense of exhilaration when they receive fake identification documents for an undercover mission.

Is Mr. Wang not sharing the entire background to his decision to defect to Australia? Or could he be deliberately amplifying his role in Chinese intelligence, in an effort to appear useful to the Australian government and thus secure political protection by Canberra? In the words of Alex Joske, an analyst at the  International Cyber Policy Centre of the Australian Strategic Policy Institute, the details in some of Mr. Wang’s claims mean that “government investigations should uncover the facts eventually. But we don’t know the full story and we probably never will”.

Author: Joseph Fitsanakis | Date: 26 September 2019 | Permalink

Europol culls thousands of Islamic State online accounts in ‘day of action’

Telegram AppThe law enforcement agency of the European Union, in cooperation with the popular online messaging service Telegram, has culled thousands of Islamic State online accounts in what it described as “a day of action”. The operation was coordinated by the European Union Agency for Law Enforcement Cooperation, better known as Europol. The agency coordinated its activities with the popular instant-messaging service Telegram, which the Islamic State has used as its main platform of mass communication since 2014.

In a press release that appeared on its website on Friday, Europol said that it had managed to locate “a significant portion of key actors within the Islamic State network on Telegram” and “push [them] away from the platform”. The messaging app confirmed the joint “day of action” with Europol and said it took down over 5,000 “terrorist accounts and bots” from its network on November 22 and 23. The company said this was nearly 10 times higher than the usual number of user accounts taken down daily for violating its user agreement.

The BBC said that the removal of the accounts appeared to affect heavily the activities of the Nashir News Agency, an Islamic State propaganda outlet that uses the Telegram app to publicize press releases from the Islamic State. Dozens of online channels and community groups that were moderated by Nashir News Agency editors were also impacted, as their moderators had disappeared from the network. On Saturday, some Telegram users began posting information about replacement accounts for Nashir News Agency press releases, but these too were taken down within hours.

This was the second major “day of action” against online terrorist propaganda that Europol coordinated, with the first one being in April of last year. But critics argue that such efforts are unlikely to have a long-term impact on the ability of terrorist groups to spread online propaganda, unless they are constant and systematic. Meanwhile, Islamic State sympathizers criticized the Telegram service on other social media platforms and warned that moves to silence the group would result in its membership going deeper underground.

Author: Joseph Fitsanakis | Date: 26 September 2019 | Permalink

Chinese defector reveals identities of Chinese undercover spies in Asia and Australia

Wang LiqiangA Chinese intelligence defector has reportedly given the Australian government information about entire networks of Chinese undercover spies in Hong Kong, Taiwan and Australia, according to reports. The story of Wang “William” Liqiang, made headlines all over Australia during the weekend, culminating in an entire episode of 60 Minutes Australia about him airing on Sunday. The 26-year-old from China’s eastern Fujian province reportedly defected to Australia in October, while visiting his wife and newborn son, who live in Sydney. He is currently reported to be in a safe house belonging to the Australian Security Intelligence Organization (ASIO).

Police in the Chinese city of Shanghai claim that Mr. Wang is a small-time criminal who has been found guilty of using fraudulent documents and has a 15-month suspended prison sentence on his record. In a statement issued on Sunday, China’s embassy in Canberra described Mr. Wang as a “convicted fraudster” who was “wanted by police after fleeing [China] on a fake passport”. But according to reports in the Australian media, Mr. Wang has provided the ASIO with a 17-page sworn statement, in which he details his work as an undercover intelligence officer. He is also said to have shared the identities of senior Chinese intelligence officers in Taiwan and Hong Kong, and to have explained how they organize and implement espionage operations on behalf of Bejing.

In a leading article published on Saturday, The Sydney Morning Herald referred to Mr. Wang as “the first Chinese operative to ever blow his cover” and claimed that he had given the ASIO “a trove of unprecedented inside intelligence” about Chinese espionage operations in Southeast Asia. The newspaper said that the defector had revealed details about entire networks of Chinese intelligence operatives in Taiwan and Hong Kong. He also reportedly provided identifying information about deep-cover Chinese intelligence networks in Australia.

Meanwhile, in an unrelated development, Australian media said yesterday that the ASIO was examining allegations that a Chinese espionage ring tried to recruit an Australian businessman of Chinese background and convince him to run for parliament. According to reports, the spy ring approached Nick Zhao, a successful luxury car dealer, and offered to fund his political campaign with nearly $700,000 (AUS$1 million) if he run as a candidate for the Liberal Party of Australia. Zhao reportedly told the ASIO about the incident last year, shortly before he was found dead in a Melbourne hotel room. His death remains under investigation.

Author: Joseph Fitsanakis | Date: 25 November 2019 | Permalink

South Korea rejects US pressure to maintain intelligence agreement with Japan

South Korea JapanSouth Korea appears determined to reject calls from the United States to maintain an intelligence-sharing agreement with Japan, as relations between Seoul, Tokyo and Washington continue to experience tensions. The South Korean government has been issuing warnings since August that it will not renew the General Security of Military Information Agreement (GSOMIA), which is scheduled to lapse on Saturday. The agreement dates to 2016; it facilitates the sharing of intelligence between South Korea and Japan about North Korea’s missile and nuclear programs.

The agreement has fallen victim to an escalating tit-for-tat row between the two Asian countries, which is rooted in the use of forced Korean labor by Japan in World War II. South Korea is demanding financial compensation for the use of slave labor, including sex slaves, by Japanese occupation troops during Korea’s annexation by Japan from 1910 until 1945. In July, Tokyo responded to a mass boycott of Japanese goods by South Korean consumers by limiting the export of electronics to be used in South Korea’s ship-building industry. It also removed South Korea from the list of countries with the ability to fast-track their exports to Japan. South Korea responded last summer by threatening to effectively abandon GSOMIA.

Since that time, Washington has been pressuring Seoul to remain in the treaty. The United States is widely seen as the architect of GSOMIA, as it worked closely with Japan and South Korea for over 6 years to convince them to agree to exchange intelligence, despite their deep-rooted mutual animosity. The White House has traditionally viewed GSOMIA as a significant parameter in security cooperation between its allies in the Far East. Back in August, American officials warned that terminating GSOMIA would threaten its ability to monitor North Korean nuclear activity.

But Seoul is not willing to back down. On Thursday, the country’s Minister of Foreign Affairs, Kang Kyung-wha, said that unless there was “a change in Japan’s attitude, our position is we won’t reconsider”. Kang Gi-jung, Political Affairs Secretary to South Korean President Moon Jae-in, added that Seoul would “not wave a white flag”. Japan’s Minister of Defense, Taro Kono, urged South Korea to “make a sensible decision” and warned that Seoul, not Tokyo, would be the biggest victim of the termination of GSOMIA. Most observers expect that GSOMIA will simply expire come Saturday.

Author: Joseph Fitsanakis | Date: 22 November 2019 | Permalink

Turkey arrests German embassy lawyer on espionage charges

Germany Embassy TurkeyTurkish authorities have charged a lawyer working for the German embassy in Ankara with espionage, further-straining the already tense relationship between the two North Atlantic Treaty Organization allies. German newsmagazine Der Spiegel, which reported on the arrest, did not name the lawyer, but said he is a Turkish citizen and was arrested in September.

The newsmagazine said the lawyer had been hired by the German embassy to obtain information about Turkish citizens who had applied for political asylum in Germany. German authorities would regularly give the lawyer identifying information about asylum applicants. The lawyer would then verify with Turkish police that the applicants had a blank criminal record and were not wanted for participation in criminal activity. The German embassy would then forward the information collected by the lawyer to the German Federal Office for Migration and Refugees (known in Germany as BAMF), which would subsequently approve or reject the asylum applications.

Following the lawyer’s arrest by the Turkish National Intelligence Service (MİT), German authorities are concerned that the Turkish government has seized identifying information on at least 50 Turkish applicants for political asylum in Germany. Some of these applicants are reportedly members of Turkey’s persecuted Kurdish minority. Others are alleged supporters of Fethullah Gülen a United States-based former political ally of Turkish President Recep Tayyip Erdoğan, who Turkey accuses of having orchestrated the failed 2016 military coup against Erdoğan.

The German Foreign Office has described the lawyer’s arrest as “incomprehensible” and has reportedly warned those asylum seekers affected by it that their safety may be endangered. Meanwhile, German diplomats are engaged in high-level talks with the Turkish government to secure the lawyer’s release, according to Spiegel. The effort is being led by no other than Martin Erdmann, a veteran diplomat who is serving as Germany’s ambassador to Turkey.

Author: Joseph Fitsanakis | Date: 21 November 2019 | Permalink

Iraqi spy chief warns of impeding ‘catastrophe’ as ISIS rebuilds Middle East network

Saad Mozher Al-AllaqIn a rare interview, the head of Iraq’s military intelligence has warned of an impending “catastrophe” as the Islamic State continues to edge ever-closer to rebuilding its networks of fighters and supporters in the Middle East. Lieutenant General Saad Mozher Al-Allaq, head of Iraq’s Military Intelligence Directorate, gave a rare interview to the American news network CNN, which was aired on Monday.

In his interview, General Al-Allaq claimed that his agency was able to intercept recent communications from senior operatives of the Islamic State —also known as the Islamic State of Iraq and Syria, or ISIS. The communications allegedly refer to “Operation BREAK DOWN THE FENCES”, which he said is a plan by ISIS to storm numerous prisoner of war camps that are located across northwestern Iraq and Kurdish- or Turkish-controlled northern Syria. These camps hold as many as 10,000 men, many of whom are believed to be ISIS fighters. Other camps hold nearly 100,000 women and children who are connected to male ISIS fighters. According to General Al-Allaq, ISIS seeks to rebuild its powerbase in the region by freeing and re-arming these prisoners.

In addition to guarding against the possibility of a mass exodus of alleged ISIS prisoners and their families, the Iraqi spy chief said that his force has been working with Turkish authorities to neutralize networks of ISIS operatives in Turkey. Several senior ISIS “emirs” —senior members of the organization, with significant political influence and funding power— were able to bribe smugglers to take them to Turkey, where they are currently reorganizing the militant group’s illicit networks. The Iraqi government recently notified Ankara of the whereabouts of nine such ISIS “emirs”, said Al-Allaq.

The Iraqi spy chief concluded his interview by warning of an impending “catastrophe”, should ISIS be able to implement Operation BREAK DOWN THE FENCES and rebuild its support base in the region. Representatives of the Turkish government told CNN that Ankara was looking into the Iraqis’ allegations of ISIS “emirs” operating inside Turkey.

Author: Joseph Fitsanakis | Date: 19 November 2019 | Permalink

Russia, Lithuania and Norway exchange prisoners in rare three-way spy-swap

Frode BergA rare three-way spy-swap has reportedly taken place between Russia and two North Atlantic Treaty Organization (NATO) members, Lithuania and Norway. Rumors of a possible exchange of imprisoned spies between the three countries first emerged in mid-October. However, all three governments had either denied the rumors or refused to comment at the time. It now turns out that the spy-swap, which international news agencies described as “carefully coordinated” was the result of painstaking negotiations between the three countries, which lasted several months.

A major part of the process that led to last week’s spy swap was the decision of the Lithuanian parliament to approve altering the country’s criminal code. The new code allows the president of Lithuania to pardon foreign nationals who have been convicted of espionage, if doing so promotes Lithuania’s national interest. The new amendment also outlines the process by which the government can swap pardoned foreign spies with its own spies —or alleged spies— who may have been convicted of espionage abroad. On Friday, Lithuanian President Gitanas Nausėda announced he had pardoned two Russian nationals who had been convicted of espionage against Lithuania, in accordance with the new criminal code. The president’s move was approved by the country’s multi-agency State Defense Council during a secret meeting.

Shortly after President Nausėda’s announcement, Sergei Naryshkin, Director of Russia’s Foreign Intelligence Service (SVR) said that Moscow would immediately proceed with “reciprocal steps”. The Kremlin soon released from prison two Lithuanian nationals, Yevgeny Mataitis and Aristidas Tamosaitis. Tamosaitis was serving a 12-year prison sentence, allegedly for carrying out espionage for the Lithuanian Defense Ministry in 2015. Mataitis, a dual Lithuanian-Russian citizen, was serving 13 years in prison, allegedly for supplying Lithuanian intelligence with classified documents belonging to the Russian government.

The two Lithuanians were exchanged for two Russians, Nikolai Filipchenko and Sergei Moisejenko. Filipchenko is believed to be an officer in the Russian Federal Security Service (FSB), who was arrested by Lithuanian counterintelligence agents in 2015. He had been given a 10-year prison sentence for trying to recruit double agents inside Lithuania, allegedly in order to install listening bugs inside the office of the then-Lithuanian President Dalia Grybauskaite. Moisejenko was serving a 10½ year sentence for conducting espionage and for illegally possessing firearms. Lithuania alleges that Moisejenko had been tasked by Moscow with spying on the armed forces of Lithuania and NATO. Along with the two Lithuanians, Russia freed Frode Berg (pictured), a Norwegian citizen who was serving a prison sentence in Russia, allegedly for acting as a courier for the Norwegian Intelligence Service.

On Saturday, Darius Jauniškis, Director of Lithuania’s State Security Department, told reporters in Vilnius that the spy swap had taken place in a remote part of the Russian-Lithuanian border. He gave no further information about the details exchange, or about who was present at the site during the spy-swap.

Author: Joseph Fitsanakis | Date: 18 November 2019 | Research credit: E.G. | Permalink

Al-Baghdadi’s ISIS hideout was equipped with frequently used internet connection

Abu Bakr al-BaghdadiThe Islamic State’s Syrian hideout that housed the group’s leader until his demise on October 26, was equipped with a frequently used internet connection, according to Arab media reports. Abu Bakr al-Baghdaid, the self-proclaimed caliph of the Islamic State, was killed by United States soldiers in Barisha,  a village in the Syrian province of Idlib, which is located just two miles from the Turkish border.

The region that surrounds Barisha is under the control of Turkey and can most accurately be described as a Turkish protectorate inside Syria. Moreover, it is heavily monitored by several intelligence agencies that have been looking for al-Baghdadi for years. It has therefore been generally assumed that the Islamic State leader’s hideout was kept isolated from the outside world and that no digital telecommunications means were used by its inhabitants, out of fear that they would be monitored by the Syrian authorities, Turkey, the United States, or others.

But a new report from the Dubai-based Al-Aan TV claims that the hideout was equipped with a frequently used internet connection and that it was active almost up to the moment US troops stormed the compound. The exclusive report, which aired on Thursday, alleges that the internet connection was set up in February of this year, and that it was used almost daily. The last time it was active was just 12 hours prior to the raid that killed al-Baghdadi and several members of his family.

The bill for the internet connection was approximately $8.00 a month and was paid by Abu Muhammad al-Halabi, a Syrian smuggler whose name also appears on tax records as the owner of the property, according to Al-Aan. The report provides no information about the type of online activity that the internet connection at the Barisha compound was used for.

Author: Joseph Fitsanakis | Date: 15 November 2019 | Permalink

Venezuelan ex-spy chief disappears as Spain seeks to extradite him to US

Hugo CarvajalThe former director of Venezuela’s military spy agency, who is wanted in the United States for drug trafficking, reportedly disappeared in Spain as authorities there were attempting to extradite him to Washington. Hugo Carvajal is a retired general and former diplomat, who was a member of the late Venezuelan President Hugo Chávez’s inner circle. From 2004 to 2011, under Chávez’s tutelage, Carvajal headed the Directorate General of Military Counterintelligence (DGCIM).

In 2008 the US named Carvajal as a major facilitator of international drugs trafficking and imposed financial sanctions on his assets around the world. Washington accused Carvajal of assisting the paramilitary group known as the Revolutionary Armed Forces of Colombia (FARC) transport drugs from Latin America to Mexico and from there to the US.

Things took an interesting turn, however, when in February of this year Carvajal posted a video on social media in which he denounced Chávez’s successor, President Nicolás Maduro, and sided with his arch-nemesis, Juan Guaido, the President of the National Assembly of Venezuela. In his video, Carvajal urged the Venezuelan armed forces to stop siding with Maduro and support Guaido as Venezuela’s acting president. Guaido is openly supported by the United States and dozens of other Western countries.

Soon after making his announcement, Carvajal fled to Spain, where he was arrested in April, after the US Department of Justice filed a formal request for the former spy chief’s extradition to America. But in September, Spain’s top criminal court ruled that Carvajal would not be extradited to the US. The former spy chief was released minutes after the court made its decision known.

Last Friday, however, the same court accepted an appeal by the Office of the Public Prosecutor and overturned its earlier decision. Shortly after the court’s decision, Spanish media reported that Carvajal had already been arrested and was due to be transported to the US in a matter of days. But three days later, the former spy chief posted a message on his personal Twitter account saying that neither he nor his lawyers had been approached by Spanish police. It appeared, then, that Carvajal had not been detained.

Spanish newspaper El Pais reported on Tuesday that Carvajal was nowhere to be found when Spanish police officers went to his residence in Madrid to arrest him. His whereabouts are currently unknown, said the paper. The US Department of Justice has not commented on the case.

Author: Joseph Fitsanakis | Date: 13 November 2019 | Permalink

Massive data dump identifies users of influential far-right website

Atomwaffen DivisionA data dump of unprecedented scale includes usernames, IP addresses and even the content of thousands of private chat logs stolen from an influential neo-Nazi website that is now defunct. The data belonged to IronMarch, which was founded in 2011 by Alexander Mukhitdinov, a Russian far-right activist using the online nom-de-guerre “Slavros”. In the nearly six years of its existence, the website featured some of the most extreme and uncompromising far-right content on the World Wide Web.

The discussions that took place on IronMarch’s message boards are believed to have led to the creation of several far-right groups in Europe, Australia, and the United States. Among them is the notorious Atomwaffen Division (pictured), an American neo-Nazi group that focuses on street-fighting and is known to train its members in the use of military-grade weapons and guerilla warfare tactics. Another group that organized and recruited heavily through IronMarch was Vanguard America, one of the organizers of the Unite the Right rally in Charlottesville, Virginia in 2017.

But the website abruptly shut down its operations in late 2017. No explanation was given. Users of far-right online forums are used to experiencing such sudden changes in hosting platforms, which are due to legal challenges, intervention by law enforcement, etc. So they did what they always do in such cases: they migrated to other far-right platforms where they continued to discuss and organize. IronMach never resurfaced, so it was eventually forgotten.

Last Wednesday, however, a user calling themselves “antifa-data” uploaded what appears to be the entire metadata and chat log archive of IronMarch on the website of the Internet Archive. The content was later removed, but not before it was downloaded by thousands of Internet Archive users, among them government agencies. The data dump reportedly includes the usernames of IronMarch members, as well as the emails associated with their individual accounts. It also contains the IP addresses of IronMarch members and even the contents of private messages that they exchanged with other members.

Some investigative websites have since reported that numerous IronMarch users were associated with email accounts belonging to American universities. Others stated in private messages that they were members of the armed forces of several countries in Europe and the Americas. At least one user appears to have run for Congress in the United States. On Friday, the American website Military Times said that United States authorities were concerned that many of IronMarch’s members said they were serving in the US Armed Forces or expressed a desire to join a military branch. A spokesman for the US Marine Corps told the Military Times that there was “no place for racial hatred or extremism in the Marine Corps”.

Author: Joseph Fitsanakis | Date: 12 November 2019 | Permalink

Turks feared Russia might bomb Erdoğan’s palace in 2015, intelligence memo shows

Hmeimim AirbaseAuthorities in Turkey were concerned that Russia might bomb the presidential palace in Ankara in 2015, to retaliate against the downing of a Russian fighter jet by the Turkish military, according to an intelligence report. On November 25 of that year, a Russian Sukhoi Su-24M attack bomber was shot down by a Turkish F-16 fighter jet over the Syrian-Turkish border. Ankara claimed that the Russian aircraft had violated Turkish airspace for longer than five minutes and had failed to respond to 10 warning messages communicated by radio. By the time the Russian plane was fired upon it was nearly 1.5 miles inside Turkish airspace, according to Turkey’s Ministry of Defense. But the Kremlin claimed that the downed aircraft had been flying a mile south of the Turkish border when it was shot down.

A few hours after the incident, Russian President Vladimir Putin described it as “a stab in the back by terrorist accomplices” and warned Ankara that Moscow would not tolerate such attacks on its armed forces. International observers expressed concern about a possible armed retaliation by Russia against the Turkish military. Now a formerly classified intelligence report suggests that Turkish authorities were concerned that Russia might bomb the country’s presidential palace in Ankara. The report was unearthed by the Nordic Research Monitoring Network (NRMN), a security-oriented research initiative staffed by Turkish experts who live in Europe and the United States.

The NRMN said the previously classified report was authored by Signals Intelligence Directorate of Turkey’s National Intelligence Organization, known as MİT. It describes an intercepted conversation that took place on December 3, 2015. The conversation involved a Syrian military officer, who was believed to be a brigadier general in the army of Syrian President Bashar al-Assad. The officer, identified in the document only as Adnan, was reportedly speaking with an unnamed Russian general, identified only as Sergei, and another unidentified senior officer in the Syrian armed forces. The discussion concerned an upcoming meeting between Syrian and Russian military officials at the Hmeimim Airbase, a Russian-operated military installation on the outskirts of Latakia.

The purpose of the meeting was for the Russian forces to officially notify the Syrians that their warplanes would be carrying a heavier payload in the future, and to explain why. At one point in the conversation the Russian general told the Syrians that part of the heavier payload would consist of “barrel bombs [that] will go to Erdoğan’s palace”. The MİT interpreted that to mean the Turkish Presidential Complex, which is located inside the Atatürk Forest Farm in the Beştepe neighborhood of Ankara. The ensuing intelligence report contains handwritten notes indicating that the information contained in it was communicated to the leadership of the Turkish Armed Forces and the Turkish General Staff.

At the end no attack took place. In June of the following year President Erdoğan sent a letter to his Russian counterpart, in which he expressed his condolences for the family of the Russian pilots who were killed when their aircraft was shot down. Following the July 2016 coup, the two Turkish pilots who had shot down the Russian aircraft were arrested on suspicion of being involved in the attempt to topple Erdoğan. This, in association with the Turkish president’s letter of sympathy, were seen by Moscow as goodwill gestures from Ankara. Relations between the two countries were eventually restored.

Author: Joseph Fitsanakis | Date: 11 November 2019 | Permalink

Saudi king hosts CIA director a day after US charges two Saudis with espionage

Gina HaspelA day after the United States Department of Justice charged two Saudi citizens with engaging in espionage on American soil, Saudi officials hosted the director of the Central Intelligence Agency in Riyadh, reportedly to discuss “the longstanding Saudi-US partnership”.

According to the Federal Bureau of Investigation, two Saudi men, both employees of the US-based company Twitter, were instructed by a member of the Saudi royal family to surrender the personal information of at least 6,000 Twitter users who posted criticism of the Saudi government on social media. As intelNews reported on Thursday, one of the men is under arrest, while the other managed to evade US authorities and is thought to be sheltered by the Saudi government.

It is believed that the member of the Saudi royal family who instructed the two men to carry out espionage was no other than Mohammed bin Salman, the oil kingdom’s crown prince. Wednesday’s developments marked the first time that US authorities have publicly filed espionage charges against Saudi nationals in America.

A day after the charges were filed in the US state of California, Gina Haspel, the director of the Central Intelligence Agency, was reportedly hosted by Saudi Arabia’s king Salman in Riyadh. In addition to Salman and Haspel, the meeting was attended by several senior Saudi officials, including Khalid al-Humaidan, who directs the kingdom’s General Intelligence Directorate. Saudi Arabia’s foreign minister, Prince Faisal bin Farhan, was also present at the meeting.

A tweet by the Saudi Arabian embassy in Washington said that the meeting between Haspel and the Saudi officials revolved around “the longstanding Saudi-US partnership”. It also said that participants discussed “a number of regional and international developments”, but gave no further information. The state-owned Saudi Press Agency said simply that the meeting focused on “a number of topics of mutual interest”, but did not elaborate.

Author: Joseph Fitsanakis | Date: 08 November 2019 | Permalink

FBI charges Twitter employees with working as spies for Saudi Arabia

TwitterUnited States authorities have charged two employees of the social media firm Twitter and a member of staff of Saudi Arabia’s royal family with spying for Riyadh. The Federal Bureau of Investigation filed a complaint on Wednesday in San Francisco, accusing the three men of “acting as unregistered agents” for Saudi Arabia. The phrase is used in legal settings to refer to espionage.

According to the FBI, the charges stem from an investigation that lasted several years and centered on efforts by the oil kingdom to identify and silence its critics on social media. In 2015, the Saudi government allegedly reached out to Ali Alzabarah, a 35-year-old network engineer working for Twitter, who lived in San Francisco. The complaint alleges that Ahmed Almutairi (also known as Ahmed Aljbreen), who worked as a “social media advisor” for Saudi Arabia’s royal family, arranged for Alzabarah to be flown from San Francisco to Washington to meet with an unidentified member of the Saudi dynasty.

Alzabarah, along with another Twitter employee, 41-year-old Ahmad Abouammo, were given money and gifts by the Saudi government in return for supplying it with private information about specific Twitter users, according to the complaint. The information provided by the two Twitter employees to the Saudi authorities allegedly included the email addresses, IP addresses and dates of birth of up to 6,000 Twitter users, who had posted negative comments about the Saudi royal family on social media.

Special Agents from the FBI’s Settle field office arrested Abouammo at his Seattle home on Tuesday. However, Alzabarah is believed to have fled the United States along with his family before the FBI was able to arrest him. He is currently believed to be in Saudi Arabia and is wanted by the FBI, which has issued a warrant for his arrest. The Saudi government has not commented on the case. Twitter issued a statement on Wednesday, saying it planned to continue to cooperate with the FBI on this investigation.

Author: Joseph Fitsanakis | Date: 07 November 2019 | Permalink

Turkey’s arrest of al-Baghdadi’s sister is ‘intelligence goldmine’ says official

Rasmiya AwadA Turkish government official has described the arrest of the sister of the late Islamic State leader Abu Bakr Al-Baghdadi as “an intelligence goldmine”. The official was referring to the arrest of Rasmiya Awad, an Iraqi citizen, who was reportedly arrested on Monday. Little is known about al-Baghdadi’s sister. She is believed to have been born in 1954, which makes her 65 years old this year.

Awad was arrested during a raid by the Turkish-backed Free Syrian Army at a makeshift refugee camp in the suburbs of Azaz, a city of 30,000 located approximately 20 miles northwest of Aleppo. The Aleppo province in northwestern Syria has been under Turkish military control since 2016. Since then, the Turkish military command has relied on the Ankara-backed Free Syrian Army and a selection of smaller pro-Turkish militia to control the region.

The Associated Press reported that Awad was detained along with her family, including her husband, her daughter-in-law, and her five children. Five other adults were arrested in the vicinity of the refugee camp, all of them Iraqi citizens, but there is no word yet on whether they are in any way connected with the Islamic State. Turkish officials told the Associated Press yesterday that Awad, her husband and her daughter-in-law were being interrogated.

The news agency quoted one Turkish government official as saying that Awad’s capture was “an intelligence goldmine. What she knows about [the Islamic State] can significantly expand our understanding of the group and help us catch more bad guys”, the official is reported to have told the Associated Press.

Author: Joseph Fitsanakis | Date: 06 November 2019 | Permalink