News you may have missed #912: Analysis edition

Trojan Shield

SolarWinds: How Russian spies hacked US government departments. Last year, in perhaps the most audacious cyber attack in history, Russian military hackers sabotaged a tiny piece of computer code buried in a popular piece of software called SolarWinds. After it was installed, Russian agents went rummaging through the digital files of the US departments of Justice, State, Treasury, Energy, and Commerce —among others— and for nine months, they had unfettered access to top-level communications, court documents, even nuclear secrets. On July 4, the CBS television show 60 Minutes aired a special segment on this topic.

Why did the FBI’s encrypted phone sting not target US suspects? In 2018, a San Diego-led federal sting secretly launched an encrypted communications company as part of Operation TROJAN SHIELD (pictured). Over the next few years, FBI agents, working with law enforcement partners in Australia, New Zealand and Europe, seeded thousands of spyware-infected phones into the hands of criminals and used them to build cases against 300 organized crime groups around the world, from Australian biker gangs to Italian mafia cells. But one country was off limits for investigating agents: the United States. The San Diego Union-Tribune’s Kristina Davis explains why.

Opinion: Clearance holders need to protect America by studying espionage. John William Davis, retired counterintelligence officer who instructed the threat portion of the US Department of the Army’s Operations Security Course, argues that “many, many techniques for recruiting spies continue much as they did over preceding years. We can learn from the past and apply what we learn to the future.”