Gas explosion reported at Russian research facility that houses Ebola and smallpox

Vector RussiaRussian authorities announced on Tuesday that a gas explosion had damaged a section of a medical facility in Siberia that houses live samples of viruses such as Ebola and smallpox, but added that there was no need to declare a biomedical emergency. The explosion reportedly took place on Monday at the State Research Center of Virology and Biotechnology, known as Vector. The six-floor concrete and steel facility is located in the isolated Siberian town of Kotsovo, near the city of Novosibirsk, 600 miles from the Mongolian border.

Vector was founded in 1974 by the Soviet state to study mass infectious agents that could be used to build biological weapons. Today it remains as one of the world’s largest virology research centers, specializing in the treatment of some of the most lethal infectious diseases, such as Ebola, tularemia and swine flu. The Vector facility is believed to be one of two locations in the world that house live samples of the smallpox virus. The Centers for Disease Control and Prevention in the United States city of Atlanta is also believed to house samples of the virus.

According to a statement issued on Tuesday by the Russian state-owned news agency TASS, the Vector facility sustained an explosion on Monday afternoon local time. The explosion was reportedly caused by a gas canister used by workers who were carrying out repairs at a sanitary inspection room located on the fifth floor of the Vector facility. An employee suffered unspecified injuries as a result of the explosion, according to the statement. However, “no work with biological agents was being carried out in the [Vector] building” at the time of the explosion, so there was no need for a state of emergency, according to the statement. Russian media reported on Tuesday that Vector personnel were present on the site and that no biological threat alerts had been issued.

Author: Ian Allen | Date: 18 September 2019 | Permalink

US considering drastic increase in intel-sharing with Saudi Arabia after drone attacks

AramcoUnited States officials are considering increasing substantially America’s intelligence-sharing with Saudi Arabia following last weekend’s drone attacks that halved the Kingdom’s oil production and shook global markets. The attacks occurred in the early hours of Saturday, September 14, at two refineries located in eastern Saudi Arabia. The refineries are owned by Aramco, Saudi Arabia’s government-owned oil conglomerate, and are part of the world’s largest crude oil processing facility. The massive fires caused by the attacks were contained within hours and no casualties were reported. But the facilities had to cease operation so that repairs could be completed. This cut Saudi Arabia’s oil production by close to 50 percent, which amounted to a 5 percent reduction in global oil production. The impact on the world’s financial markets was immediate: by Monday morning, oil prices had seen their most significant one-day surge since the 1991 Gulf War.

The Houthi movement, a collection of Yemeni Shiite militias supported by Iran, claimed responsibility for the attack. A Houthi movement spokesman said on Sunday that the attacks had been carried out with the use of modified commercially available drones. He also warned that Saudi Arabia would experience more attacks of this kind in the future. Iran has rejected accusations by American and some Saudi officials that it was responsible for the attacks.

On Monday the Reuters news agency reported that the US is considering the possibility of drastically increasing the volume and quality of intelligence it shares with Saudi Arabia. The move is allegedly intended as one in a series of measures to be taken by Washington in response to Saturday’s drone attacks. In the past, the US has been selective in how much intelligence it shares with the Saudis, who have been involved in an increasingly bloody civil war in Yemen since 2015. Washington is weary of being seen to have a decisive role in support of the Saudi-led military campaign in Yemen, in light of the criticism that the latter has drawn from numerous international bodies and governments around the world.

The US Congress has also condemned the Saudi campaign in an unusually bipartisan fashion, and has tried to stop President Donald Trump from providing material support to it. In May of this year, the US president defied Congress and signed two dozen arms sales agreements worth over $8 billion with the oil kingdom. The move upset many critics of Saudi Arabia in the Republican Party, who sharply criticized the Saudi government for killing journalist Jamal Khashoggi inside the Saudi consulate in Istanbul, Turkey, last year. A possible decision by Washington to increase its intelligence sharing with Saudi Arabia is bound to prompt a critical response from Congress, especially if it relates to the ongoing war in Yemen.

Author: Joseph Fitsanakis | Date: 17 September 2019 | Permalink

Russia fired officials over Smolenkov defection, filed INTERPOL search request

INTERPOLThe Russian government reportedly fired a number of officials over the defection of a senior Kremlin aide, who alleged worked as an American spy. Meanwhile, Moscow has filed a search request with INTERPOL about the alleged defector’s whereabouts. News of the defection was reported on September 9 by the American news network CNN. The network alleged that the man —which it did not name— was exfiltrated from Russia in 2017 by the United States Central Intelligence Agency, over fears about his life. A subsequent report in the Russian daily newspaper Kommersant identified the alleged defector as Oleg Smolenkov, 50, and said that he disappeared along with his wife and three children in the summer of 2017 while on holiday in Montenegro.

On September 11, the Reuters news agency revealed that Smolenkov was a career diplomat who served as senior aide to Yuri Ushakov, Russia’s former ambassador to the United States and senior international affairs advisor to Russian President Vladimir Putin. But the Kremlin disputes claims that Smolenkov was a highly placed official or that he could have been in possession of damaging classified intelligence.

According to a new report from Russia’s InterFax news agency, the Kremlin disciplined a number of Russian officials for permitting Smolenkov and his family to travel to Montenegro. The disciplinary action was taken soon after Smolenkov’s disappearance and led to a number of firings, said InterFax, citing anonymous government sources. In the summer of 2016, the Kremlin had issued a travel ban for Montenegro, which barred government employees from traveling there, due to the deteriorating relations between Moscow and the former Yugoslav Republic. Montenegrin authorities had previously claimed that Russia tried to stage a coup and planned to kill the country’s prime minister. According to InterFax, an investigation by “the relevant law enforcement agencies” concluded that those officials who had allowed the Smolenkovs to travel to Montenegro had “violated the ban”. They were therefore “disciplined and [some] were fired”, said the anonymous source.

Meanwhile it was reported on Friday that the Russian Ministry of Foreign Affairs filed a search request for Smolenkov and his family with INTERPOL, the international agency that facilitates worldwide cooperation between national police organizations. When asked about it by Western news media, a Russian government spokeswoman said that Russia did what any other country would do in this situation: it contacted INTERPOL with “questions regarding the disappearance of […] a citizen of Russia on the territory of a foreign state along with his family […] and his presence on the territory of the United States”, said the spokeswoman.

Author: Joseph Fitsanakis | Date: 16 September 2019 | Permalink

Israel planted surveillance devices targeting Trump, claims report

White HouseThe intelligence services of Israel planted surveillance devices around the White House in an attempt to spy on United States President Donald Trump and his senior advisors, according to a report published on Thursday. The report, authored by Politico’s Daniel Lippman, cited three former US officials with knowledge on the matter, “several of whom served in top intelligence and national security posts”, it said.

According to Politico, the Israelis planted International Mobile Subscriber Identity (IMSI) catchers —known in technical-surveillance lingo as “StingRays” after a leading hardware brand. StingRay devices are designed to simulate the activity of legitimate cell towers in order to trick cell phones into communicating with them. That allows StingRay users to monitor the physical whereabouts of targeted cell phones. Some of the more expensive Stingray models can intercept the actual content of telephone conversations and can even plant Trojans on the compromised phones of unsuspecting users.

Politico said that the StingRays found around the White House were of the highest technical sophistication, and were “likely intended” to spy on President Trump, his senior advisers and other close associates. Politico said it had no information on whether the attempt was successful. The spy devices were detected by the Department of Homeland Security (DHS) in 2017 and acknowledged by US government officials in 2018. Senior American intelligence officials allegedly told Politico that an exhaustive two-year investigation into the matter showed “with confidence [that] the Israelis were responsible” for the StingRays.

The investigation was led by the counterintelligence division of the Federal Bureau of Investigation with the help of the DHS and the Secret Service. The National Security Agency and the Central Intelligence Agency are also known to assist such counterintelligence investigations. The devices were disassembled and their technical specifications were carefully inspected to assess their history and origins. Investigators reportedly concluded that very few countries have the technical and financial capabilities to build and plant such devices in the US, and that Israel was the most likely culprit.

Politico also said that some intelligence officials are unhappy about the Trump administration’s lack of response to the alleged spying by Israel. According to the officials, the White House did not file a protest —either publicly or privately— with the Israeli government, and “there were no consequences for Israel’s behavior”.  On Thursday afternoon, the US president voiced skepticism when asked by reporters about the Politico report: “I really would find that hard to believe”, said Trump, adding that his “relationship with Israel has been great”. Meanwhile the office of the Israeli Prime Minister Benjamin Netanyahu dismissed the Politico report as “a blatant lie” and noted that Israel’s spy services had “a directive from the Israeli government not to engage in any intelligence operations in the US”.

Author: Joseph Fitsanakis | Date: 13 September 2019 | Permalink

Tens of thousands of ISIS members are re-radicalizing inside Kurdish prison camps

Islamic State womenTens of thousands of supporters of the Islamic State, many of them women and children, are re-radicalizing inside vast Kurdish-run prison camps with inadequate security and almost no infrastructure or provisions. In a shocking report published last week, The Washington Post exposed the dire conditions at the al-Hawl prison camp in northern Syria, which the paper described as “a cauldron of radicalization” and “an academy” for captured supporters of the Islamic State (known also as the Islamic State of Iraq and Syria, or ISIS). Over 70,000 people are being held at the prison camp, of which 20,000 are believed to be women and 50,000 are children. Male members of the Islamic State are being held separately. Most of the 70,000 inmates in al-Hawl are Syrian and Iraqi citizens. An estimated 10,000 consist of Africans, Asians, Europeans and Arabs from countries other than Syria and Iraq. They are held in a separate annex of the prison camp and are believed to be the most radical of all the inmates.

The inmates of the al-Hawl prison camp are guarded and provided for by no more than 400 Kurdish fighters of the Western-supported Syrian Democratic Forces, according to The Post. The paper cited fourteen people, including inmates, Kurdish officials and aid workers, who claimed that the 400 guards are unable to enter the camp or provide even a semblance of law and order. Instead, law and order inside the prison is maintained by the women, who remain fully committed to the principles of the Islamic State, said the paper. They continue to follow the strict rules of the Islamic State and impose brutal punishment on those women and children who do not follow these rules. Women who speak to people from outside the prison camp, including journalists and lawyers, are later beaten and tortured; some have even been executed as a form of punishment, said The Post. Many of the Kurdish guards have also been attacked by the women and have been stabbed with makeshift weapons or had their arms and legs broken by them.

Islamic State paraphernalia, including black flags and pro-ISIS banners, are regularly confiscated from inmates. The latter have even managed to smuggle video messages to the outside world. In one such video message, a group of veiled al-Hawl inmates are seen holding the banner of the Islamic State and urging the group’s male members to “light the fire of jihad and free us [women] from these prisons”. The women in the video call themselves as “women of the mujahedeen” and issue a warning against “the enemies of Allah”: “you think you have imprisoned us in your rotten camp. But we are a ticking bomb. Just you wait and see”, they say. Responding to these messages, a Kurdish intelligence official told The Post that the Syrian Democratic Forces could “contain the women, but we can’t control their ideology”.

Author: Joseph Fitsanakis | Date: 12 September 2019 | Permalink

Facebook shuts down suspected state effort to prop up Sudanese military regime

Sudan civil unrestFacebook has shut down a well-funded online campaign to support Sudan’s military regime, which some say is part of wider efforts by Egypt, the United Arab Emirates and Saudi Arabia to stop democratic reforms in Sudan. The northeast African country has experienced civil unrest for more than a year. In February Sudan’s longtime strongman, Omar Hassan al-Bashir, fell from power after 30 years, following prolonged popular protests. But the new military junta that succeeded him launched a violent campaign of suppression against the country’s pro-democracy movement. The junta’s leaders have relied heavily on ample support provided by three close American allies, namely Egypt, Saudi Arabia and the United Arab Emirates. Meanwhile, the student-led pro-democracy movement has taken to the Internet to mobilize the Sudanese population. The regime has at times shut down the Internet in an attempt to stop pro-democracy organizers from spreading their message online.

Now it has emerged that Facebook detected and terminated a systematic misinformation campaign to promote the views of the Sudanese regime while also slamming the pro-democracy movement as reckless and irresponsible. The campaign was reportedly carried out by two self-described “digital marketing” companies: New Waves, headquartered in Egypt, and Newave, which is based in the Emirates. According to Facebook, the two companies worked in parallel to establish hundreds of fake accounts on social media platforms such as Facebook and Instagram. They also spent nearly $170,000 to promote material that was posted online by an army of paid users. The latter were allegedly paid $180 a month to post disinformation and other forms of carefully directed propaganda on social media. A total of 13.7 million Facebook and Instagram users were reached in the course of the disinformation campaign, according to Facebook. Twitter and Telegram were also employed by the two companies to post messages in favor of the Sudanese military. Other messages extoled the Libyan warlord Khalifa Haftar, as well as Muse Bihi Abdi, president of the self-declared state of Somaliland. Egypt, Saudi Arabia and the Emirates are staunch supporters of both Haftar and Abdi.

Facebook said it had been unable to collect evidence of a direct link between the New Waves/Newave disinformation campaign and the governments of Egypt, Saudi Arabia and the United Arab Emirates. But it added that the features of the campaign bore the hallmarks of a state-run operation. The New York Times, which reported on the story last week, said the Emirati company, Newave, did not respond to several requests for a comment. Amr Hussein, an Egyptian former military officer who owns the Cairo-based New Wave, issued a public statement calling Facebook “liars” and denying he had any links to the Emirates.

Author: Joseph Fitsanakis | Date: 11 September 2019 | Permalink

CIA denies Trump’s mishandling led to alleged exfiltration of senior Russian asset

Trump CIA - JFThe United States Central Intelligence Agency has questioned the accuracy of a media report, which claimed that “repeated mishandling” of intelligence by President Donald Trump resulted in the exfiltration of a high-level source from Russia. According to the American news network CNN, the CIA carried out the exfiltration operation in 2017. Despite the success of the operation, the removal of the asset has left the US without this high-level source at a time when it is most needed, said CNN. The network cited “a person directly involved in the discussions” to exfiltrate the asset, but said it was withholding key details about the case in order to “reduce the risk of the person’s identification”.

According to CNN, the CIA asset was so highly placed inside the Kremlin that the US had “no equal alternative” inside the Russian government. The asset was in a position to provide “both insight and information” on Russia’s secretive President, Vladimir Putin. But by 2016, the sheer length of the asset’s cooperation with the CIA had caused some intelligence officials at Langley to consider exfiltrating him from Russia. Typically agents-in-place have short careers; they are either captured by their adversaries or are exfiltrated once their handlers start to believe that they are burned out or that their life may be in danger. But exfiltration operations in so-called “denied areas” —regions or countries with formidable counterintelligence resources that make it difficult for the CIA to operate there— are rare.

The CNN report claims that the decision to exfiltrate the high-level source was taken after a May 2017 meeting between Trump and Putin, with the participation of senior American and Russian officials. The latter included Foreign Minister Sergei Lavrov and then-Ambassador to Washington Sergey Kislyak. Citing an American “former senior intelligence official”, CNN alleges that Trump “repeatedly mishandled classified intelligence” at that meeting, which could have led to the exposure of the CIA’s asset. At that time, the CIA decided that it was time to exfiltrate the asset and proceeded to do so successfully.

But the CIA disputed the accuracy of CNN’s story. The agency’s Director of Public Affairs, Brittany Bramell, dismissed what she called “CNN’s narrative” as “inaccurate”. She added that the agency’s judgements about exfiltrations of agents are “life-or-death decisions” that are based solely on “objective analysis and sound collection”, not on “misguided speculation that the President [mishandled] our nation’s most sensitive intelligence —which he has access to each and every day”. CNN said on Monday that Trump and “a small number of senior officials” were told about the exfiltration in advance. The news network also said that it was not privy to details about the extraction operation or about the current whereabouts of the exfiltrated asset.

Author: Joseph Fitsanakis | Date: 10 September 2019 | Permalink

Analysis: Al-Qaeda shifts strategic focus to Syria while still seeking to attack West

Jabhat al-NusraIn an effort to remain relevant, al-Qaeda has shifted its strategic focus from Yemen to Syria but continues to pursue a globalist agenda by seeking ways to attack Western targets, according to an expert report. Following the meteoric rise of the Islamic State in 2014, al-Qaeda found it difficult to retain its title as the main representative of the worldwide Sunni insurgency. But in an argue published last week on the website of the RAND Corporation, two al-Qaeda experts argue that the militant group is rebounding.

The authors, Middle East Institute senior fellow Charles Listeris and RAND senior political scientist Colin Clarke, editorial that al-Qaeda followed a pragmatic and patient strategy after 2014. Specifically, the group remained on the margins and “deliberately let the Islamic State bear the brunt of the West’s counterterrorism campaign” they argue. At the same time, al-Qaeda has sought to remain relevant by shifting the center of its activity from Yemen to Syria. That decision appears to have been taken in 2014, when the group began to systematically transport assets and resources from its traditional strongholds of Afghanistan and Pakistan to the Levant, the authors argue.

Observers are still evaluating the implications of al-Qaeda’s strategic shift. Listeris and Clarke note that counterterrorism experts have yet to fully understand them. What appears certain is that al-Qaeda’s branch in Syria, the al-Nusra Front, “proved to be the most potent military actor on the battlefield” in the Levant. It did so by operating largely independently from al-Qaeda central, which allowed it to act with speed in pursuit of a strictly localized agenda that attracted many locals. At the same time, however, al-Nusra’s independence effectively separated it from its parent organization. Many al-Qaeda loyalists accused the group of abandoning al-Qaeda’s principles and left it when it rebranded itself to Jabhat Fateh al-Sham (Levantine Conquest Front) in 2016 and Hayat Tahrir al-Sham (Organization for the Liberation of the Levant) in 2017.

Al-Qaeda itself denounced Hayat Tahrir al-Sham in 2018 and today supports a number of smaller militias that operate on the ground in Syria. These smaller groups appear to be extremely professional and experienced, and are staffed by “veterans with decades of experience at al Qaeda’s highest levels”. What does this mean about al-Qaeda’s strategic priorities? Listeris and Clarke argue that Syria remains al-Qaeda’s priority. But the group remains focused on attacking the West while also pursuing guerrilla warfare in Syria, they say. This reflects al-Qaeda’s overarching narrative, namely to fight in local conflicts while pursuing the “far enemy” (the West), which it sees as a mortal enemy of Islam.

Author: Joseph Fitsanakis | Date: 09 September 2019 | Permalink

Italy arrests Russian ex-foreign ministry official for espionage following US request

Naples International AirportItaly has arrested a Russian business executive and former foreign ministry official who is wanted by the United States for carrying out espionage against an American aviation firm. Alexander Yuryevich Korshunov, 57, who is a former official in Russia’s Ministry of Foreign Affairs, was reportedly arrested on August 30 at Naples International Airport in Italy. On Thursday, the US Department of State filed a criminal complaint against Korshunov, accusing him of trade secret theft. According to the complaint, Korshunov’s espionage benefited a Russian state-owned aviation company. He was allegedly assisted by 59-year-old Maurizio aPolo Bianchi, an Italian citizen, who remains at large.

The US government claims that the two men conspired to steal blueprints for the design of gearbox accessories used in jet engines. The company they allegedly stole the information from is GE Aviation, a company based in the US state of Ohio. Bianchi reportedly used to work for one of GE Aviation’s subsidiaries in Italy and dealt with clients from Russia and China, among other countries. But he eventually left the company and joined another firm that contracted with Aviadvigatel, a subsidiary of United Engine Corporation. The latter is a Russian-owned aerospace company that employed Korshunov. During his work for Aviadvigatel, Bianchi is accused of having employed a number of current and former employees of GE Aviation as consultants. But the work that Bianchi carried out for his new company compromised trade secrets belonging to GE Aviation, according to the US Department of Justice. Moreover, the Department claims that both Bianchi and Korshunov, who supervised Bianchi’s work on behalf of Aviadvigatel, were aware that they were exploiting trade secrets that did not belong to them.

There is no information on Bianchi’s whereabouts. If convicted, the two men face up to 10 years in prison each. On Thursday, the Russian President Vladimir Putin dismissed the charges against Korshunov as biased and said they were likely motivated by “unfair competition” practices by American companies. The Italian government has issued no public comment about Korshunov’s arrest.

Author: Joseph Fitsanakis | Date: 06 August 2019 | Permalink

Threat from espionage is bigger than terrorism, says Australia’s spy chief

Duncan LewisThe director of Australia’s main national security agency has warned in a public speech that the threat from espionage —including cyber espionage— is greater than terrorism, and poses an “existential” danger to established states. Duncan Lewis was appointed director of the Australian Security Intelligence Organisation (ASIO) in 2014, having already served for more than four decades in the Australian military and civilian government sectors. On Wednesday, Lewis gave a rare public address at the Lowy Institute in Sydney, ahead of his retirement from government service later this month.

The ASIO director said in his speech that terrorism poses “a terrible risk” and should be seen as “a very serious matter”. On the other hand, “terrorism has never been an existential threat to established states”, said Lewis. Additionally the risk from the current wave of Salafi-Jihadist terrorism has “plateaued” and should not be expected to increase drastically, he noted. On the other hand, the threat of foreign espionage “is ultimately an existential threat to the state, or it can be an existential threat to the state”, added Lewis. The ASIO director described espionage and foreign-influence activities as “typically quiet, insidious and with a long tail”. Thus, “unlike the immediacy of terrorism incidents”, the harmful effects of espionage may not appear for many years or even decades after the initial activity has been carried out, he said.

Additionally, said Lewis, Australia’s “middle power status” and close alliances with Western countries make it a major target for state-sponsored human and cyber espionage attacks. Adversary nations see Australia as “a rich target”, he said, and launched espionage operations against it daily. As a result, foreign intelligence operations against Australia are “on a growth path” and are taking place on an “unprecedented” scale and scope, according to Lewis. Such operations include “covert attempts to influence and shape the views of the [Australian] public, media, government and diaspora communities, both within Australia and overseas”, said Lewis, adding that they take place “every day”.

The espionage threat to Australia does not come from “one particular nation”, said the AFIO director, although some nations tend to display more “intent, sophistication and commitment” than others. Australia is obligated to resist against these threats by continuing to develop its counter-espionage capabilities and finding innovative and effective ways to detect and defend against foreign interference, Lewis said at the conclusion of his talk.

Author: Joseph Fitsanakis | Date: 05 September 2019 | Permalink

Iranian engineer recruited by Holland helped CIA and Mossad deliver Stuxnet virus

AIVD HollandAn Iranian engineer who was recruited by Dutch intelligence helped the United States and Israel infect computers used in Iran’s nuclear program with the Stuxnet cyber weapon, according to a new report. Discovered by researchers in 2010, Stuxnet is believed to have been designed with the aim of sabotaging the nuclear program of the Islamic Republic of Iran. The virus targeted the industrial computers —known as programmable logic controllers— that regulated mechanical and electronic hardware in Iranian nuclear installations. By compromising the software installed on these computers, Stuxnet manipulated the rotor speed of nuclear centrifuges at Iran’s Natanz Fuel Enrichment Plant. By increasing the centrifuges’ rotor speed to unmanageable levels, Stuxnet rendered many of these machines permanently inoperable.

Most observers agree that Stuxnet was a joint cyber sabotage program that was devised and executed by the United States and Israel, with crucial assistance from Germany and France. But now a new report from Yahoo News claims that the contribution of Dutch intelligence was central in the Stuxnet operation. Citing “four intelligence sources”, Yahoo News’ Kim Zetter and Huib Modderkolk said on Monday that Holland’s General Intelligence and Security Service (AIVD) was brought into the Stuxnet operation in 2004. In November of that year, a secret meeting took place in The Hague that involved representatives from the AIVD, the United States Central Intelligence Agency, and Israel’s Mossad.

It was known that the Islamic Republic’s nuclear weapons program was crucially assisted by A.Q. Khan, a Pakistani nuclear physicist and engineer. In 1996, Khan sold the Iranians designs and hardware for uranium enrichment, which were based on blueprints he had access to while working for a Dutch company in the 1970s. By 2004, when the Dutch were consulted by the CIA and the Mossad, the AIVD had already infiltrated Khan’s supply network in Europe and elsewhere, according to Yahoo News. It also had recruited an Iranian engineer who was able to apply for work in the Iranian nuclear program as a contractor. This individual was provided with proprietary cover, said Yahoo News, which included two “dummy compan[ies] with employees, customers and records showing a history of activity”. The goal of the AIVD, CIA and Mossad was to have at least one of these companies be hired to provide services at the Natanz nuclear facility.

That is precisely what happened, according to Yahoo News. By the summer of 2007, the AIVD mole was working as a mechanic inside Natanz. The information he provided to the AIVD helped the designers of Stuxnet configure the virus in accordance with the specifications of Natanz’s industrial computers and networks. Later that year, the AIVD mole was able to install the virus on Natanz’s air-gapped computer network using a USB flash drive. It is not clear whether he was able to install the virus himself or whether he was able to infect the personal computer of a fellow engineer, who then unwittingly infected the nuclear facility’s system. The Yahoo News article quotes an intelligence source as saying that “the Dutch mole was the most important way of getting the virus into Natanz”.

It is believed that, upon discovering Stuxnet, the Iranian government arrested and probably executed a number of personnel working at Natanz. The Yahoo News article confirms that there was “loss of life over the Stuxnet program”, but does not specify whether the AIVD mole was among those who were executed. The website said it contacted the CIA and the Mossad to inquire about the role of the AIVD in the Stuxnet operation, but received no response. The AIVD declined to discuss its alleged involvement in the operation.

Author: Joseph Fitsanakis | Date: 04 September 2019 | Permalink

Russian bank accused of being ‘den of spies’ relocates to NATO member Hungary

Nikolai KosovA Russian-backed development bank, which is accused by its critics of being an intelligence front for Moscow, has relocated to Hungary, a member of the European Union (EU) and the North Atlantic Treaty Organization (NATO). The International Investment Bank (IIB) was founded in 1970 by the Soviet Union as a multilateral development banking institution. Its purpose was to assist in the economic development of the Soviet Union’s allies under the umbrella of the Soviet-led Council for Mutual Economic Assistance (COMECON). Like other Soviet financial institutions with foreign branches, it was suspected by Western spy agencies of being used by Moscow to station intelligence personnel under non-official cover.

In 1991, following the disintegration of the Soviet Union and the Eastern Bloc, the IIB entered a period of stagnation, as did many Soviet institutions of the Cold War period. But in 2002 Russian President Vladimir Putin spearheaded a government-led effort to revive the bank. Today the Russian government has a 47 percent stake in the IIB, with the remaining 53 percent owned by its other member-countries. These are all communist of former communist states: Cuba, Vietnam, Cuba, Bulgaria, Romania, Slovakia, the Czech Republic, and Hungary. Each of these member states is represented on the IIB with an official who speaks for his or her government.

Some critics express concerns that the IIB continues to serve as a front company for Russian intelligence. Some point to the IIB’s director, Nikolai Kosov, whose parents were officers in the KGB and served in several European countries, including Hungary, during the Cold War. Such criticisms resurfaced earlier this year, when it was announced that the IIB would move its headquarters to Budapest. The Hungarian government said it would host IIB’s 100 personnel and granted the IIB building privileges that are usually extended to diplomatic facilities. For instance, Hungarian authorities will not be able to enter the IIB premises without prior authorization by the bank.

The Hungarian government of Prime Minister Viktor Orban has said that the IIB’s relocation to Budapest will further-strengthen Hungary’s relations with Russia and help promote the former Soviet ally as a growing financial hub in Europe. But one critic told the Al Jazeera news network that the IIB “is more likely to make Budapest a Russian intelligence center than a financial hub”. Another critic, referred to by Al Jazeera as a “diplomatic source”, said that NATO has limited its sharing of classified information with Hungary “due to fears it leaves the door open to Russia”.

Author: Joseph Fitsanakis | Date: 03 September 2019 | Permalink

Trump’s photo tweet gave away US secrets, say experts

Satellite reconnaissanceA tweet by United States President Donald Trump may have compromised secrets about America’s reconnaissance satellite capabilities, according to experts who analyzed it over the weekend. The American president posted a message about Iran’s space program on his personal Twitter account on Saturday, August 30. The message read: “The United States of America was not involved in the catastrophic accident during final launch preparations for the Safir SLV Launch at Semnan Launch Site One in Iran. I wish Iran best wishes and good luck in determining what happened at Site One”.

Trump was referring to an apparent rocket launch failure that happened on Friday, August 29, at the Semnan Space Center in northern Iran. The suspected rocket failure caused significant damage to Semnan’s Site One launching pad, some of which appears to have burned down. It is thought to be the second such incident in Iran and it must be a source of frustration for Tehran, which has been trying to place a new satellite in orbit for almost a year now. Washington and other countries have criticized Tehran’s space program, saying it is a disguised missile program that could potentially be used to launch a nuclear bomb.

Along with his written message, the US president tweeted an aerial photograph showing the damage at the Semnan Space Center. Some have since claimed that the photograph, which Trump appears to have taken from a printed document given to him by a US spy agency, offers “an unprecedented example of US spy satellites at work” and inadvertently reveals some of America’s most closely guarded satellite capabilities. Experts say they have been able to determine that the photograph was taken by a satellite, rather than a surveillance aircraft or unmanned drone. Some say they have even been able to pinpoint the exact satellite that was used to generate the image, by analyzing the angle of the photograph. It is believed that it was taken by USA 224, which is one of America’s top-secret optical reconnaissance satellites.

More importantly, the US president’s tweet may have provided Washington’s adversaries with an example of the precise power of America’s reconnaissance satellites. Their exact surveillance capabilities are a closely held secret that is known by specialists at the National Reconnaissance Office and the National Geospatial Intelligence Agency, two of America’s most obscure intelligence agencies. It has long been speculated that the images captured by American spy satellites far surpass the 25 centimeter resolution that is available to commercial satellite services. A number of experts have suggested that the photograph tweeted by Trump displays a resolution that “is amazingly high” and must be “at least 10 centimeters, if not better”. One specialist juxtaposed the image tweeted by the US president next to an image of the same launch site taken with a commercial satellite. The difference is indeed remarkable. One expert told the NBC news network that Trump’s “utterly careless” tweet would “have global repercussions”.

Last year Nada Bakos, who spent 20 years in the Central Intelligence Agency, wrote an editorial in The Washington Post in which she warned that foreign intelligence agencies were paying close attention to the US president’s tweets. Bakos argued that President Trump’s “Twitter feed is a gold mine for every foreign intelligence agency”. She added that, throughout her CIA career, she and her team “never had such a rich source of raw intelligence about a world leader, and we certainly never had the opportunity that our adversaries (and our allies) have now”, because of Trump’s social media presence.

Author: Joseph Fitsanakis | Date: 02 September 2019 | Permalink

US offensive cyber campaign disabled Iran’s strike capabilities, say sources

IRGC IranThe Islamic Revolutionary Guard Corps (IRGC) is still recovering from the damage it suffered by an offensive American cyber campaign against it that took place in June, according to sources. The attack allegedly degraded the IRGC’s ability to strike at oil tankers and other ships in the Persian Gulf. The New York Times said on Thursday that the cyber attack took place on June 20, hours after United States President Donald Trump called off airstrikes on Iran. The White House had considered launching the airstrikes in retaliation against the downing of an American surveillance drone by Iranian forces and their alleged use of limpet mines against commercial oil tankers by the IRGC the previous month.

The paper did not reveal details of the cyber campaign, but said it did not target any part of Iran’s missile or other defense programs. Its mission was to degrade the covert strike capabilities of the IRGC, which operates in a paramilitary capacity and is not supervised by the military. Washington blamed the IRGC for the limpet mine attacks against oil tankers, and expressed concerns that they would continue. The cyber attack corrupted the computer databases and communications networks that the IRGC uses to co-ordinate covert operations at sea, and resulted in the temporary cessation of IRGC attacks on oil tankers, said The Times.

The June 20 cyber attacks were not meant to be permanent but their effects have endured much longer than was expected, according to the paper. It cited claims by anonymous senior American officials that the IRGC is “still trying to repair critical communications systems and has not recovered the data lost in the attack”. It is also worth noting that, according to US sources, Iran did not escalate its own cyber attacks against Western targets in retaliation to the American cyber campaign against the IRGC.

However, according to The Times, some American officials have expressed doubts about the wisdom and long-term impact of the cyber operation. They claim that the cyber attack gave the Iranians the opportunity to collect valuable information about US cyber capabilities. It also allowed them to detect and fix their vulnerabilities so that they are now better able to defend against future cyber attacks. Lastly, the attacks neutralized IRGC communications networks, which the US had penetrated and was collecting vital intelligence from, they argue.

Author: Joseph Fitsanakis | Date: 30 August 2019 | Permalink

In unprecedented move, US plans to block undersea cable linking US with China

undersea telecommunications cableIn a move observers describe as unprecedented, a United States government regulator is preparing to recommend blocking the construction of an 8,000-mile long undersea cable linking America with China, allegedly due to national security concerns. Washington has never before halted the construction of undersea cables, which form the global backbone of the Internet by facilitating nearly 100% of Internet traffic. Much of the undersea cable network is in the process of being replaced by modern optical cables that can facilitate faster Internet-based communications than ever before.

One such scheme is the Pacific Light Cable Network (PLCN), an 8,000-mile undersea cable construction project funded by Google, Facebook and Dr. Peng Telecom & Media Group Co., one of China’s largest telecommunications-hardware manufacturers. The PLCN’s completion will produce the first-ever direct Internet link between Los Angeles and Hong Kong, and is expected to increase Internet speeds in both China and the United States. Most of the PLCN has been laid and its completion is projected for this year.

But now an American regulatory panel plans to recommend blocking the PLCN’s final construction phase. According to The Wall Street Journal, the panel fears that the $300 million undersea cable project may facilitate Chinese espionage. The Justice Department-led panel is known as Team Telecom and consists of officials from several American government agencies, said the paper, citing “individuals involved in the discussion” about PLCN.

Never before has the US blocked the construction of an undersea cable, reported The Journal. National security concerns have been raised with reference to past undersea cable projects, some of whom were partially funded by Chinese-owned companies. But the projects eventually went ahead after the manufacturers were able to demonstrate that the design of the undersea cables forbade the installation of wiretaps. If the PLCN project is blocked, therefore, it will be the first such case in the history of the Internet in America.

The paper said that supporters of the PLCN argue that it would give American government regulators more control over the security of Internet traffic before it even reaches US territory. Additionally, PLCN investors claim that the completion of the project will provide American companies with broader access to consumers in Asia. Google, Facebook, Dr. Peng Telecom and the US government declined to comment on the news report.

Author: Joseph Fitsanakis | Date: 29 August 2019 | Permalink