More spies now in Brussels than Vienna, Austrian intelligence chief says

Peter GridlingThe head of Austria’s counterintelligence agency has said that Brussels has now replaced Vienna as Europe’s spy capital. For nearly a decade, this blog has published expert commentary that points to the Austrian capital being the world’s busiest spy den. In 2009, German broadsheet Die Welt explained that Vienna had “the highest density of [foreign intelligence] agents in the world”. The reasons for this are partly historic: during the Cold War, the center of Vienna was located less than an hour’s drive from the Iron Curtain, making it a central location for East-West spy intrigue. Additionally, Austria boasted then, and boasts today, an efficient transportation network that connects it to both Western and Eastern Europe.

Furthermore, Vienna hosts the headquarters of several important international agencies, including the Organization of Petroleum Exporting Countries (OPEC), the International Atomic Energy Agency (IAEA), and the Organization for Security and Co-Operation in Europe (OSCE). This gives dozens of countries the opportunity to station in Vienna large numbers of diplomats, in addition to those who staff their embassies there. Consequently, it is estimated that the Austrian capital today hosts nearly 20,000 foreign diplomats, which is a substantial number for such a small country with a permanent population of less than 9 million. Experts believe that around half of these foreign diplomats are in fact connected to a foreign intelligence agency.

But in a rare public appearance on Thursday, Peter Gridling, head of Austria’s main counterintelligence agency, said that Vienna no longer topped the list of preferred destinations for the world’s spies. Gridling heads the Vienna-based Federal Office for the Protection of the Constitution and Counterterrorism, known as BVT. He was speaking during the official presentation of the BVT’s annual Constitutional Protection Report for 2017, which was held at the headquarters of the Ministry of the Interior. Gridling told reporters that the number of foreign intelligence operatives pretending to be diplomats posted in the Austrian capital remained significant, and that Austria as a whole was still “a favored area of operations” by the world’s intelligence agencies. However, he added that Vienna had now been overtaken by the Belgian capital Brussels as the spy capital of Europe. Gridling said that, according to his agency’s calculations, there was now a greater density of spies in Brussels than in any other European capital.

Gridling thus appears to concur with numerous intelligence experts and practitioners, among them Alain Winants, former Director of Belgium’s State Security Service (SV/SE), who have claimed since 2009 that Brussels is home to more spies than any other city in the world. When asked to specify the number of foreign intelligence operatives that are active in Vienna, Gridling said it was “in the neighborhood of hundreds of people, but certainly fewer than 1,000”. The Austrian counterintelligence chief declined calls to provide further elaboration on the mater.

Author: Joseph Fitsanakis | Date: 29 June 2018 | Permalink

Ukraine, Russia, spied on Dutch investigators of MH17 plane disaster, TV report claims

MH17 crashDozens of Dutch security officers, legal experts, diplomats and other civil servants were systematically spied on by Ukrainian and Russian intelligence services while probing the aftermath of the MH17 disaster, according to a report on Dutch television. Malaysia Airlines Flight 17, a scheduled passenger flight from Amsterdam to Kuala Lumpur, was shot down over eastern Ukraine on July 17, 2014. All 283 passengers and 15 crew on board, 196 of them Dutch citizens, were killed. In the aftermath of the disaster, the Dutch Safety Board spearheaded the establishment of the multinational Joint Investigation Team (JIT), which is still engaged in a criminal probe aimed at identifying, arresting and convicting the culprits behind the unprovoked attack on Flight MH17. As part of the JIT, dozens of Dutch officials traveled to Ukraine to initiate the investigation into the plane crash and repatriate victims’ bodies and belongings. Their activities were conducted with the support of the Ukrainian government, which is party to the JIT.

But on Tuesday, Holland’s RTL Niews broadcaster said that members of the Dutch JIT delegation were subjected to systematic and persistent spying by both Ukrainian and Russian government operatives. According to RTL, Dutch investigators found sophisticated eavesdropping devices in their hotel rooms in Ukraine, and believed that their electronic devices had been compromised. Citing “inside sources” from the Dutch government, the broadcaster said that, during their stay in Ukraine, members of the Dutch JIT delegation noticed that the microphones and cameras on their wireless electronic devices would turn on without being prompted. They also noticed that the devices would constantly try to connect to public WiFi networks without being prompted. Upon their return to Holland, Dutch officials had their wireless devices examined by Dutch government security experts. They were told that numerous malware were discovered on the devices.

RTL Niews said that the question of whether valuable information relating to the MH17 investigation was stolen by foreign spies remains unanswered. But it noted that the members of the Dutch JIT delegation were warned about possible espionage by foreign powers prior to traveling to Ukraine. During their stay there, they were not allowed to send messages in unencrypted format and were only permitted to hold sensitive conversations in especially designated rooms inside the Dutch embassy in Kiev. The Dutch government did not respond to questions submitted to it by RTL Niews. But it issued a statement saying that its security experts had briefed and trained the Dutch JIT delegation prior to its trip to Ukraine. Members of the delegation were told that foreign parties would seek to collect intelligence, because the MH17 investigation was taking place in a “conflict area with significant geopolitical interest” for many parties. They were therefore advised to “assume that they were being spied on [and] adjust [their] behavior accordingly” while in Ukraine, the Dutch government’s statement said.

Author: Ian Allen | Date: 28 June 2018 | Permalink

Norway spy agency urges IT firms to be cautious when outsourcing operations abroad

Broadnet NorwayThe Norwegian National Security Authority (NSM) has warned the country’s information technology firms to prioritize national security over cutting costs when outsourcing their operations abroad. The warning follows what has come to be known as the “Broadnet affair”, which, according to the Norwegian government, highlighted the dangers of extreme cost-cutting measures by Norway’s heavily privatized IT industry. The incident is named after Broadnet, Norway’s leading supplier of fiber-optic communications to the country’s industry and state sectors. Among Broadnet’s customers is Nødnett, an extensive digital network used by agencies and organizations that engage in rescue and emergency operations, including police and fire departments, as well as medical response agencies. Although 60% of the Nødnett network is owned by the Norwegian government, Broadnet is a member of the Nødnett consortium, and is thus supervised by Norway’s Ministry of Transport and Communications.

In September of 2015, Broadnet fired 120 of its Norway-based employees and outsourced their jobs to India, in search of cost-cutting measures. The company signed a multimillion dollar contract with Tech Mahindra, an outsourcing firm based in Mumbai. But an audit by the Norwegian government soon discovered several instances of security breaches by Tech Mahindra staff. The latter were reportedly able to access Nødnett without authorization through Broadnet’s core IT network, which was supposed to be off-limits to outsourced staff without Norwegian security clearances. Soon after the breaches were discovered, Broadnet began to bring its outsourced operations back to Norway. By the end of 2017, all security-related IT tasks had been returned to Norway. In the meantime, however, Broadnet had come under heavy criticism from the Norwegian government, opposition politicians, and the NSM —the government agency responsible for protecting Norway’s IT infrastructure from cyber threats, including espionage and sabotage.

The NSM warning —published earlier this month in the form of a 20-page report— makes extensive mention of the Broadnet affair. It recognizes the right of Norwegian IT firms to outsource some or all of their operational tasks as a cost-cutting measure. But it also stresses that the country’s IT firms are required by law to abide to national security protocols when outsourcing part of their IT portfolios to foreign companies. There have been numerous instances in recent years, where “risk management obligations relative to outsourcing decisions by Norwegian [IT] companies have fallen short”, the NSM report states. It adds that IT firms must abide to strict protocols of risk management when making outsourcing decisions. It also states that the firms’ Norway-based senior managers must regain complete overview of outsourced projects at every step of the way.

Author: Joseph Fitsanakis | Date: 27 June 2018 | Permalink

Singapore officials reject rumors of spy devices used at Trump-Kim summit

USB fan espionageSingaporean officials have dismissed reports that a promotional item given away for free during the June 12 summit between the leaders of the United States and North Korea contained an espionage device. Over 2500 reporters from nearly every country covered the meeting between US President Donald Trump and North Korean Supreme Leader Kim Jong-un. Upon arriving in Singapore’s Sentosa Island, where the summit took place, journalists were given a free promotional packet that included novelty items such as pens, notepads, a water bottle, and a USB fan. The USB fan consisted of blades connected to a miniature electric motor, which was in turn connected to a USB cable. The cable allowed the device to be powered by a computer or other electronic device with a built-in USB port.

But rumors soon emerged in the media that the free USB fans, which were made in China, contained malware. As soon as the fans were plugged into an electronic device, the malware penetrated its operating system, allowing hackers to access its contents remotely, said the reports. The allegations were first aired on Radio France Internationale, the French government’s international broadcaster. They were then picked up by the BBC, which said that many reporters covering the historic summit had been warned “not to plug [the USB fans] in to their laptops”. According to the reports, the malware installed on the USB fans was able to steal computer files and turn a laptop’s built-in camera and microphone into remotely-controlled eavesdropping devices.

But the government of Singapore has strongly rejected these reports. In a statement issued in English, Singapore’s Ministry of Communications and Information said that the USB fans had been a gift of the Sentosa Development Corporation, a Singapore government body tasked with promoting tourism in Sentosa Island, where the Trump-Kim summit took place. The ministry added that the USB fans had been produced long before Trump and Kim decided to meet in Singapore and that they had been originally manufactured as gifts for tourists visiting the island. The statement issued by the ministry also said that reporters appreciated the fans, given the tropical climate on Sentosa Island, where the temperature reached 33C (91F) on the day of the summit.

Author: Ian Allen | Date:  25 June 2018 | Permalink

Chinese shipbuilding boss gave CIA aircraft carrier secrets, reports claim

Liaoning aircraft carrier ChinaOne of China’s most senior shipbuilding executives, who has not been seen in public for nearly two weeks, has been charged with giving secrets about China’s aircraft carriers to the United States. Sun Bo, 57, is general manager of the China Shipbuilding Industry Corporation (CSIC), China’s largest state-owned maritime manufacturer, which leads nearly every major shipbuilding project of the Chinese navy. Most notably, Sun headed the decade-long retrofitting of the Liaoning, a Soviet-built aircraft carrier that was commissioned to the Chinese Navy’s Surface Force after the collapse of the Soviet Union.

The ship arrived at the CSIC’s Dalian shipyard in northeastern China in 2002. Work on the vessel was completed in 2012. Today CSIC heads the construction of so-called Type 001A, China’s first home-built aircraft carrier, which is said to be modeled largely on the Liaoning. The company is also spearheading the construction of numerous Chinese Navy frigates, latest-generation destroyers, and numerous other vessels. Earlier this year, it was announced the CSIC would build the Chinese Navy’s first nuclear-powered aircraft carrier.

As the second most senior official of China’s largest and most important shipbuilder, Sun has supervised all of the company’s projects during the past two decades. But Sun effectively disappeared after June 11, when he made his last known public appearance at a CSIC event. On June 17, a brief notice posted on the company’s website stated that Sun had been placed under investigation for “gross violation of laws and [Communist] Party [of China] discipline”. The brief notice said that the probe of Sun’s activities was led by China’s National Supervision Commission and the Communist Party of China’s Central Commissariat for Discipline Inspection, but provided no further details.

It has now been reported by multiple Chinese news websites that Sun is under investigation not simply for graft, but for far more serious activities involving espionage. Specifically, it is claimed that Sun was recruited by the United States Central Intelligence Agency because of his supervisory role in China’s aircraft carrier building programs. He is believed to have provided the CIA with information about the decade-long retrofitting of the Liaoning. More importantly, there are reports that Sun gave the CIA blueprints and other technical specifications of the Type 001A, which is currently under construction at a top-secret facility. The Hong Kong-based English-language news website Asia Times said on Thursday that, given the sensitive nature of the charges against Sun, it is unlikely that the Chinese government would reveal the outcome of the investigation of the CSIC executive.

Author: Joseph Fitsanakis | Date: 22 June 2018 | Permalink

German intelligence chief says Russia tried to hack energy grid

BfV GermanyThe head of Germany’s domestic security agency has publicly blamed the Russian government for a large-scale cyberattack that has targeted German energy providers. The comments follow a June 13 announcement on the subject by Germany’s Federal Office for Information Security (BSI), which is charged with securing the German government’s electronic communications. According to the BSI, a widespread and systematic attack against Germany’s energy networks has been taking place for at least a year now. The attack, which the BSI codenamed BERSERK BEAR, consists of various efforts by hackers to compromise computer networks used by German companies that provide electricity and natural gas to consumers around the country.

The attacks have been mostly unsuccessful, said BSI, having managed to breach just a few office computer networks. Energy grids have remained largely unaffected by BERSERK BEAR, said BSI. But the agency has refused to disclose information about the extent of the alleged cyberattacks and the companies that were targeted. It claims, however, that the situation is now “under control”. On Wednesday, Hans-Georg Maassen, director of Germany’s Federal Office for the Protection of the Constitution (BfV) said in an interview that the Russian government was most likely behind the attacks. There were “numerous clues pointing to Russia”, said Maassen, including the method with which the attack was carried out. The “modus operandi” of the attackers “is a major indicator that points to Russian control of the offensive campaign”, said Maassen.

Earlier this month, the United States imposed for the first time economic sanctions on Russian companies that allegedly helped the Kremlin tap undersea communications cables used by Western countries. One of the companies was identified by the US Department of the Treasury as Digital Security, which Washington said has helped Russian intelligence agencies develop their offensive cyber capabilities. Two of Digital Security’s subsidiaries, Embedi and ERPScan, were also placed on the US Treasury Department’s sanctions list. But the Kremlin fervently denies these accusations. On Wednesday, a spokesman for the office of the Russian presidency said that Moscow had “no idea what [Maassen] was talking about”. A Russian Foreign Ministry spokesman told reporters in the Russian capital that Germany and other countries “should provide facts” to justify their accusations against Moscow.

Author: Joseph Fitsanakis | Date: 21 June 2018 | Permalink

Israel charges former cabinet minister with spying for Iran

Gonen SegevIsrael has charged Gonen Segev, who served as the Jewish state’s Minister of Energy and Infrastructure, with spying for its archenemy, Iran. Segev, 62, was reportedly detained last month during a trip to Equatorial Guinea following a request by Israeli officials. He was then extradited to Israel and arrested as soon as he arrived in Tel Aviv last month, according to a statement by the Shin Bet, Israel’s domestic security service. On Monday it emerged that Israeli authorities had imposed a gag order on the case, forbidding Israeli media from reporting any information about it. The order appears to have now been lifted.

In 1992, when he was 35, Segev was elected as one of the Knesset’s youngest members, representing the conservative Tzomet party. Initially an opposition Knesset member, Segev eventually left Tzomet and joined a governing coalition with the Labor Party, in which he served as Minister of Energy and Infrastructure. After exiting politics, Segev, who is a medical doctor by training, became a businessman and traveled frequently abroad. But in 2004 he was arrested on a flight from Holland, while reportedly trying to smuggle several thousand ecstasy pills into Israel. He was jailed for five years but was released from prison in 2007, after a commendation for good conduct. Shortly after his release, Segev moved to the Nigerian city of Abuja, where he practiced medicine. It was there, the Shin Bet claims, that he was recruited by Iranian intelligence.

In a statement released on Monday, the Shin Bet said that Segev had admitted being in regular contact with Iranian intelligence agents in Nigeria and other countries around the world. He is reported to have said that he was given a fake passport by his handlers, which he used to visit Iran on two separate occasions in order to hold secret meetings with Iranian intelligence officers. He also traveled to several other countries in order to meet with his Iranian handlers and hand them information about Israel’s energy sector and the location of energy-related security sites in the country. The Shin Bet statement added that Segev introduced his Iranian handlers —who posed as foreign businessmen— to Israeli security officials on several occasions.

It is believed that Segev appeared before a court in Jerusalem on Friday. He was charged with “assisting an enemy in wartime” and with “carrying out espionage against the State of Israel”. The judge also charged him with numerous instances of transmitting classified information to a foreign power.

Author: Joseph Fitsanakis | Date: 19 June 2018 | Permalink

Germany arrests Tunisian man for producing biological weapon in his apartment

Ricin investigation GermanyGerman authorities have charged a Tunisian citizen with building a biological weapon, after finding significant quantities of the highly toxic substance ricin in his apartment. The 29-year-old man is referred to in public reports only as “Sief Allah H.”, in compliance with German law that forbids the naming of suspects until they are found guilty in court. German officials said last Thursday that the man remains in custody and has been charged with violating Germany’s War Weapons Control Act (known as Kriegswaffenkontrollgesetz) and “preparing a serious act of violence against the state”.

According to reports, German intelligence services received a tip-off last month that the man had made online purchases of a coffee grinder and 1,000 castor seeds. Processing castor seeds creates a ricin byproduct, which can then be weaponized in the form of a powder, a fine mist, or solid pellets of various sizes. The end product is more powerful than many other toxic substances, such as cyanide. Upon entering the human body, ricin can cause multiple organ failure in less than two days. It has no known antidote.

After receiving the tip-off, German authorities began monitoring the suspect’s movements in the western German city of Cologne, near the Belgian and Dutch borders. By June, German police discovered that he had produced enough ricin to dispense as many as 1,000 lethal doses.

German media reported that “Sief Allah H.” is a sympathizer of the Islamic State. However, investigators have found no direct link between him and any militant organizations in Germany or abroad. Additionally, no evidence has yet been presented that he had planned an actual attack —in Germany or elsewhere— at a specific time. However, officials from Germany’s Federal Office for the Protection of the Constitution said it was “very likely” that the arrest of “Sief Allah H.” had averted a terrorist attack. Late last week, German newsmagazine Der Spiegel said that the suspect had made ricin by following instructions posted online by the Islamic State.

Throughout the weekend, several other apartments in Cologne were searched by German authorities. Search parties consisted of members of the local police, intelligence officers and scientists from the Robert Koch Institute, the German government agency tasked with monitoring hazards to public health.

Author: Joseph Fitsanakis | Date: 18 June 2018 | Research Credit: S.F. | Permalink

Belgium to probe alleged Spanish espionage against separatist Catalan leader

Carles PuigdemontBelgium will investigate whether Spanish intelligence spied on Carles Puigdemont, the separatist Catalan leader who escaped to Brussels after launching an unsuccessful independence bid last year. Puigdemont, 56, served as president of the Spanish region of Catalonia from January 2016 until October 2017. He was forcibly removed from office by the Spanish government, after he led the government of Catalonia in a unilateral declaration of independence from Spain. As soon as the Catalan Parliament declared that the region was independent, Madrid dissolved it, imposed direct rule on the country’s easternmost province, and declared fresh elections.

Amidst the chaos that ensued, Puigdemont, along with several other leading Catalan separatists, fled to Belgium where he requested political asylum. When it emerged that Puigdemont had fled abroad, Spanish authorities issued a European Arrest Warrant against him, on charges of sedition, rebellion against the state and misusing public funds. Fearing that the Belgian authorities might extradite him to Madrid, Puigdemont soon left for Germany, where he was detained by local police on March 25, 2018. He currently remains in Germany, while German authorities are deciding whether to grant Madrid’s request for his extradition.

Now authorities in Belgium are preparing to launch an investigation into whether Spain’s intelligence services carried out espionage against Puigdemont while he remained on Belgian soil. The investigation will most likely be carried out by the country’s Standing Intelligence Agencies Review Committee. Known broadly as Comité permanent R, the committee is an independent body that oversees the activities of Belgium’s security and intelligence apparatus. The investigation is to be launched as a result of an official parliamentary request submitted by the New Flemish Alliance, Belgium’s largest separatist party, which represents the country’s Dutch-speaking minority. The party has come out in support of Catalan independence and of Puigdemont in particular, and has urged Brussels to grant political asylum to the Catalan separatist leader.

Peter Buysrogge, a leading member of the New Flemish Alliance, said that his party wanted to know whether Spanish intelligence operated in Belgium with or without the knowledge of the Belgian government and intelligence services. He added that his party was especially interested in investigating allegations made in Catalan media that Spanish intelligence operatives followed Puigdemont and even installed a Global Positioning System (GPS) device under his car.

Author: Joseph Fitsanakis | Date: 14 June 2018 | Permalink

US imposes sanctions on companies for helping Russian spy agencies

YantarThe United States has for the first time imposed economic sanctions on a number of Russian companies, which it says helped the Kremlin spy on targets in North America and Western Europe. On Monday, the US Department of the Treasury said it would apply severe economic restrictions on a number of Russian firms that work closely with the Kremlin. One of the companies was identified as Digital Security, which Washington says has been helping Russian intelligence agencies develop their offensive cyber capabilities. Two of Digital Security’s subsidiaries, Embedi and ERPScan, were also placed on the US Treasury Department’s sanctions list. Monday’s statement by the Treasury Department named another Russian firm, the Kvant Scientific Research Institute, which it described as a front company operated by the Russian Federal Security Service (FSB).

But the Russian firm that features most prominently in Monday’s announcement is Divetechnoservices, an underwater equipment manufacturer. The US alleges that the FSB paid the company $15 million in 2011 to design equipment for use in tapping underwater communications cables. According to Washington, equipment designed by Divetechnoservices is today used by a fleet of Russian ships that sail on the world’s oceans searching for underwater communications cables to tap. One such ship, according to reports, is the Yantar (pictured), ostensibly an oceanic research vessel, which Washington says is used to detect and tap into underwater communications cables.

In addition to Divetechnoservices, the US Treasury has named three individuals who will face economic sanctions due to what Washington says is their personal involvement with the underwater hardware manufacturer. They are: Vladimir Yakovlevich Kaganskiy, the company’s owner and former director; Aleksandr Lvovich Tribun, who serves as Divetechnoservices’ general director; and Oleg Sergeyevich Chirikov, identified as the manager of Divetechnoservices’ underwater surveillance program. These men —all Russian citizens— will not be able to enter into business relationships with American companies or citizens. On Tuesday, Russia’s Ministry of Foreign Affairs dismissed the latest round of US sanctions as an act of desperation. The White House would fail in its effort to “force the Russian Federation to change its independent course of action in the international arena”, said the Russian Ministry of Foreign Affairs.

Author: Ian Allen | Date: 13 June 2018 | Permalink

Israel has secretly worked with Emirates against Iran for decades, report alleges

Mohammed bin Rashid EmiratesA lengthy exposé by a leading American newsmagazine has claimed that Israel and the United Arab Emirates, two countries that officially have no relations, have been secretly collaborating for more than two decades. Their secret cooperation has been extremely tight and has included clandestine weapons sales and intelligence-sharing, according to the exposé, which was published on the website of The New Yorker on Monday and will feature in the magazine’s print edition on June 18. The lengthy piece, which deals with the changing geopolitics of the Middle East, is written by Adam Entous, national security correspondent for The Washington Post, who has previously reported for more than two decades for Reuters and The Wall Street Journal.

Officially, Israel and the UAE have never had bilateral relations. The Emirates, an Arab federal state ruled through an absolute monarchical system, does not recognize Israel as a country. Consequently, the two Middle Eastern states have no official diplomatic, economic or military relations. But in his lengthy article published on Monday, Entous claims that Israeli and Emirati officials have been meeting in secret for at least 24 years. He alleges that the first clandestine meeting between the two sides happened in 1994 in Washington, after Abu Dhabi sought to purchase a number of American-made F-16 fighter jets. The US warned the UAE that Israel would veto the deal, fearing that these fighter jets in the hands of Arabs may eventually be used against it. But Israel did not pose a veto. Motivated by the Oslo I Accord, which it had signed the previous year, the Israeli government of Prime Minister Yitzhak Rabin secretly reached out to the Emiratis and offered “to discuss the matter directly” with them.

The first series of meetings between the two sides took place “off the record […] in a nondescript office in Washington”, says Entous. Israeli and Emirati officials were diametrically at odds over the Palestinian issue, but were in almost complete agreement on the topic of Iran. Abu Dhabi saw Iran as a major threat to the stability of the Middle East, and so did Israel. Following the secret meetings, Israel lifted its objections to Washington’s sale of F-16s to the Emiratis. That, says Entous, helped “build a sense of trust” between the two Middle Eastern countries. By the end of the 1990s, there were allegedly regular secret meetings between Israeli and Emirati officials, which included the sharing of military, security and intelligence data.

Read more of this post

Analysis: The Islamic State is far from dead; it is regrouping and rebranding itself

Islamic State ISISIn a recent series of interviews to promote his new book, Anatomy of Terror, former FBI special agent and current counterterrorism expert Ali Soufan insists that the Islamic State remains potent and dangerous. Speaking last week to the British newspaper The Guardian, Soufan warned that, even though the Islamic State was unable to hang on to its self-described caliphate in the Middle East, the group has ample opportunities to regroup. In the days of al-Qaeda, “we only had one vacuum, in Afghanistan”, from where Osama bin Laden’s organization operated from and spread its message, said Soufan. “Now we have so many vacuums —Syria, Yemen, Libya, northern Nigeria, Tunisia, the Philippines— and it’s expanding. That’s very dangerous”, he warned.

Soufan, a well-read analyst and complex thinker, who today presides over The Soufan Group and oversees the Soufan Foundation, is right to warn against the notion that the Islamic State is on its way out. The group’s meteoric rise marked a watershed moment in the modern history of militant Sunni Islam. Even if it is militarily annihilated —a prospect that is far from certain— its physical absence will in no way erase its impact and influence among its millions of supporters and sympathizers. In fact, experts warn that the group is —like al-Qaeda before it— proving to be resilient and able to withstand intense military pressure from its enemies. Currently, all signs show that the Islamic State is actively reorganizing under the command of its leader, Abu Bakr al-Baghdadi. The prolonged absence of the Iraqi-born al-Baghdadi has prompted wild speculation about this supposed demise or severe incapacitation. There are even some who claim that he was killed by an Islamic State faction in an internal coup.

But most intelligence agencies agree that al-Baghdadi —and his core lieutenants— remain very much alive and well. Three weeks ago, The Washington Post cited anonymously a “senior United States counterterrorism official” who confirmed that, by all indications, al-Baghdadi was alive and was coordinating the group’s activities in its last strongholds in eastern Syria. This is supported by communications intercepts, detainee interrogations and statements by informants, said The Post. It is important to note that Al-Baghdadi continues to have alongside him some of the militant group’s most hardened commanders, most of whom were trained in intelligence and military tactics during the reign of Saddam Hussein. Under their guidance, retreating Islamic State forces are leaving behind cell-based formations of underground fighters in areas that are liberated by the fragile US-led coalition. Read more of this post

Most government hackers now target cell phones, not computers, experts say

Cell Phone - IAThe majority of government-sponsored hacking now targets cell phones, not personal computers, according to researchers who say that political dissidents are especially targeted by totalitarian regimes around the world. Until 2015, most government-sponsored hacking operations were directed against the personal computers of targeted individuals. However, experts tell The Wall Street Journal that as of this year cell phones have become a far more lucrative target than personal computers in government-sponsored hacking operations. Researchers with Lookout Mobile Security, a security software company based in the United States, say that detected phone-hacking operations that are believed to be sponsored by governments have increased by a factor of 10 in the first five months of this year, compared to 2015.

According to Lookout, the increase in hacking operations targeting mobile phones reflects the proliferation of smartphone usage around the world, as well as the increase in consumption of cell phone software. Government-sponsored hackers usually compromise their targets’ cell phones through malicious software disguised as cell phone applications. The Wall Street Journal also reports that the software needed to build malicious software for cell phones has become cheaper and more readily available. Compromising a target’s cell phone provides hackers with information that is far more personal and sensitive than what can be found on a personal computer. The paper quotes Mike Murray, Lookout’s vice president of security research, who says: “It is one thing to compromise someone’s computer. It’s another thing to have a listening device that they carry around with them 24 hours a day”. Compromised phones become immensely powerful espionage tools, explains Murray.

Many of the individuals whose cell phones are targeted by governments are activists or dissidents who campaign for political or economic reforms in their countries. Their cell phones are targeted in systematic hacking campaigns by countries like Ethiopia, the United Arab Emirates, Cambodia, and Mexico, said Lookout. The Wall Street Journal cites Raj Samani, chief scientist for the antivirus firm McAfee, who claims that nearly 11 percent of cell phones worldwide were infected with some kind of malware in 2017. That statistic is likely to rise significantly by the end of 2018, says Samani.

Author: Ian Allen | Date: 08 June 2018 | Permalink

US evacuates more diplomats from China over ‘abnormal sounds and symptoms’

US consulate in GuangzhouThe United States has evacuated at least two more diplomatic personnel from its consulate in the Chinese city of Guangzhou, after they experienced “unusual acute auditory or sensory phenomena” and “unusual sounds or piercing noises”. The latest evacuations come two weeks after the US Department of State disclosed that a consulate worker in Guangzhou had been flown home for medical testing, in response to having experienced “subtle and vague, but abnormal, sensations of sound and pressure”.

The evacuations from China have prompted comparisons to similar phenomena that were reported by US diplomatic personnel in Cuba in 2016. Last September, Washington recalled the majority of its personnel from its embassy in Havana and issued a travel warning advising its citizens to stay away from the island. These actions were taken in response to allegations by the US Department of State that at least 21 of its diplomatic and support staff stationed in Cuba suffered from sudden and unexplained loss of hearing, causing them to be diagnosed with brain injuries. In April, the Canadian embassy evacuated all family members of its personnel stationed in Havana over similar health concerns.

US State Department sources told The New York Times on Wednesday that the two latest evacuees were among approximately 179 American diplomats and consular personnel stationed in Guangzhou, one of China’s largest commercial hubs. The city of 14 million, located 70 miles north of Hong Kong, hosts one of Washington’s six consulates in China. The building that houses the US consulate was presented to the public in 2013 as a state-of-the-art construction, which, as The Times reports, is “designed to withstand electronic eavesdropping and other security and intelligence threats”. The paper said that one Guangzhou consular employee that was evacuated this week is Mark A. Lenzi, who works as a security engineering officer. He is reported to have left China along with his wife and two children. An unnamed senior US official told The Times that a State Department medical team arrived in Guangzhou on May 31, and is currently examining all diplomatic personnel and their families.

Author: Joseph Fitsanakis | Date: 07 June 2018 | Permalink

Facebook shared user data with Chinese firm despite warnings by US intelligence

HuaweiThe online social media company Facebook shares data about its users with a Chinese telecommunications company that has been flagged in United States government reports as a threat to security. The New York Times revealed on Tuesday that Facebook has been routinely giving access to the private data of its users to four Chinese companies since at least 2010. The paper said that the data-sharing agreement with Lenovo, Oppo, TCL, and Huawei Technologies, has its roots in 2007. That was the year when Facebook began an effort to entice cell phone hardware and software manufacturers to include Facebook-friendly apps and features in their products. As part of the agreement, Facebook gave cell phone manufacturers access to its users’ private data, including “religious and political leanings, work and education history and relationship status”, said the Times.

However, several sources in the United States, United Kingdom, Australia and other governments, have repeatedly flagged Huawei as a company that is uncomfortably close to the Chinese government and its intelligence agencies. In 2011, the US Open Source Center, which acts as the open-source intelligence arm of the Office of the Director of National Intelligence, became the first US government agency to openly link Huawei with the Chinese intelligence establishment. It said that Huawei relied on a series of formal and informal contacts with the Chinese People’s Liberation Army and the Ministry of State Security, which oversee and administer China’s military and civilian intelligence apparatus. In 2013, the British government launched an official review of Huawei’s involvement in the UK Cyber Security Evaluations Centre in Oxfordshire, England, following a British Parliament report that raised strong concerns about the Chinese company’s links with the government in Beijing. And last year the Australian government expressed concern about Huawei’s plan to provide high-speed Internet to the Solomon Islands, a small Pacific island nation with which Australia shares Internet resources.

In a statement, Facebook said that all data shared with Huawei remained stored on users’ phones and was not downloaded on the Chinese’ company’s private servers. It also said that it would “phase out” the data-sharing agreement with Huawei by the middle of June. The Times noted on Tuesday that Facebook has been officially banned in China since 2009. However, the social media company has been trying to make a comeback in the Chinese market, by cultivating close links with Chinese Communist Party officials. Facebook founder Mark Zuckerberg visited China in October of last year, and met with Chinese Premier Xi Jinping and other senior officials.

Author: Joseph Fitsanakis | Date: 06 June 2018 | Permalink